added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T20:51:13.690055+00:00 | 1,576,629,570,000 | 67235d74ea21d9a66f0a7574876a7c5ba58bacda | 2 | {
"blob_id": "67235d74ea21d9a66f0a7574876a7c5ba58bacda",
"branch_name": "refs/heads/master",
"committer_date": 1576629570000,
"content_id": "565d9eb2f42f358d437ecc0893ee28f049e1e0f6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bde08ac2ac8790a57cac218eddb58a1dc5dd6725",
"extension": "py"... | 2.421875 | stackv2 | import os
import datetime
import logging.config
import traceback as tb
import io
from flask import request, jsonify, make_response
import json # it MUST be included after flask!
import inspect
from appdirs import user_config_dir
from pythonjsonlogger import jsonlogger
from lxml import etree
from xml.etree import Elem... | 201 | 32.21 | 93 | 16 | 1,475 | python | [{"finding_id": "codeql_py/stack-trace-exposure_86d5d3822181ef95_3afa4b8e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
61
] | [
null
] | [
34
] | [
35
] | |
2024-11-18T21:13:57.177504+00:00 | 1,578,895,518,000 | 4b338a79617b61817baa36c2a6f44a3c169fa2d3 | 3 | {
"blob_id": "4b338a79617b61817baa36c2a6f44a3c169fa2d3",
"branch_name": "refs/heads/master",
"committer_date": 1578895518000,
"content_id": "4f00b2ba0f831f4d0ec125aa6a0be18729e77727",
"detected_licenses": [
"MIT"
],
"directory_id": "8f280c552f2e304649661503e7aa41922ed6ee46",
"extension": "py",
"fi... | 3.0625 | stackv2 | import re
import os.path
from os import path
# Define a function for
# for validating an Email
def check_email(email):
# Make a regular expression
# for validating an Email
regex = "^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$"
if (re.search(regex, email)):
return True
else:
retur... | 21 | 20.05 | 59 | 8 | 119 | python | [{"finding_id": "codeql_py/redos_7321d03688f0753e_4f910a54", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
10,
10
] | [
null,
null
] | [
25,
41
] | [
28,
44
] | |
2024-11-18T21:14:01.091364+00:00 | 1,611,416,994,000 | 2472e22d67ce45b0c4b9ef03d4fcc53b1b8e7c99 | 3 | {
"blob_id": "2472e22d67ce45b0c4b9ef03d4fcc53b1b8e7c99",
"branch_name": "refs/heads/master",
"committer_date": 1611416994000,
"content_id": "b7309729a76ddd3a5b1b12633359c554b2e11570",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0238d090be16f29e98cf061fd4e1f462532e2c9b",
"extension": "py"... | 2.671875 | stackv2 | import sys, datetime
from UNP.Core import Account, ActTable
class Searcher:
def __init__(self, mode="username", start=0, end=100,
string="abcdefghijklmnopqrstuvwxyz", list=['ucas']):
self.mode = str(mode)
self.start = int(start)
self.end = int(end)
self.string = st... | 183 | 44.5 | 93 | 25 | 2,010 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08e48b5b56dfe078_158623d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
83,
87
] | [
null,
null
] | [
27,
27
] | [
83,
84
] | |
2024-11-18T21:14:06.885182+00:00 | 1,588,248,275,000 | 216651a31d99823475186b919af4327cfec27b30 | 3 | {
"blob_id": "216651a31d99823475186b919af4327cfec27b30",
"branch_name": "refs/heads/master",
"committer_date": 1588249224000,
"content_id": "a50606b6e3f473bd5ad5dd2021f5269d721a3dff",
"detected_licenses": [
"MIT"
],
"directory_id": "a8c25798248230e7b8286d12dece103e6fa10f65",
"extension": "py",
"fi... | 2.8125 | stackv2 | '''
Use the Face2Gene library to get syndrome information.
'''
import json
import os
import re
import logging
import collections
from typing import Union
import hashlib
import requests
from requests.adapters import HTTPAdapter
from requests.packages.urllib3.util.retry import Retry
LOGGER = logging.getLogger(__name__... | 191 | 31.86 | 79 | 18 | 1,427 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_816c3b471964aa9e_654de76f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
182
] | [
null
] | [
37
] | [
61
] | |
2024-11-18T21:14:25.871257+00:00 | 1,547,079,467,000 | 0ba403a65164fd0a2b70cc02a81bcb0f77255e7e | 3 | {
"blob_id": "0ba403a65164fd0a2b70cc02a81bcb0f77255e7e",
"branch_name": "refs/heads/master",
"committer_date": 1547079467000,
"content_id": "d8b641d059b551c9f27dcd97eacde122a186413b",
"detected_licenses": [
"MIT"
],
"directory_id": "b8cfd1f470504e5ab9b0f5cdb516a318bc8aa354",
"extension": "py",
"fi... | 2.875 | stackv2 | import logging
logger = logging.getLogger(__name__)
class RPCException(Exception):
pass
class RPC(object):
def __init__(self, address, username, password):
self.address = address
self.username = username
self.password = password
def make_call(self, method, params=[], encoder=None... | 35 | 29.31 | 90 | 15 | 216 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1470aeac878ff819_be547cab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
27
] | [
67
] | |
2024-11-18T21:14:28.381107+00:00 | 1,682,621,244,000 | 2bd79255a62e6dfab54645ca063a08d20d44834f | 3 | {
"blob_id": "2bd79255a62e6dfab54645ca063a08d20d44834f",
"branch_name": "refs/heads/master",
"committer_date": 1682621244000,
"content_id": "299185576653be0ba1b1f872775e17d6f1f423a3",
"detected_licenses": [
"MIT"
],
"directory_id": "8bbad14b3a34ec9958c6e529b0e853a47b02cefe",
"extension": "py",
"fi... | 2.640625 | stackv2 | from base64 import b64encode, b64decode
from pbincli.utils import PBinCLIError
import zlib
# try import AES cipher and check if it has GCM mode (prevent usage of pycrypto)
try:
from Crypto.Cipher import AES
if not hasattr(AES, 'MODE_GCM'):
try:
from Cryptodome.Cipher import AES
... | 327 | 34.97 | 134 | 23 | 2,811 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e69a509bd04f23c_b9f65489", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
311,
152
] | [
null,
null
] | [
31,
29
] | [
63,
59
] | |
2024-11-18T21:14:44.910418+00:00 | 1,586,073,339,000 | da0a4e4c11e3a8500bd5d348e50de44363cfaa2d | 3 | {
"blob_id": "da0a4e4c11e3a8500bd5d348e50de44363cfaa2d",
"branch_name": "refs/heads/master",
"committer_date": 1586073339000,
"content_id": "824fe1ca4340a34aac68c2293963423dd55fe252",
"detected_licenses": [
"MIT"
],
"directory_id": "b0ecab74355154fa9b57da66dd1a836ec965ef12",
"extension": "py",
"fi... | 2.984375 | stackv2 | import newspaper
import csv
import pandas as pd
import re
import os
import time
CREDIBLE = './credible.csv'
NONCREDIBLE = './noncredible.csv'
OUTPUT = './new_articles.csv'
def main():
'''
Runs through all urls from CREDIBLE and NONCREDIBLE, reads articles, then
writes to file.
'''
credible = pd.re... | 72 | 28.94 | 84 | 19 | 544 | python | [{"finding_id": "codeql_py/overly-large-range_f991d2c3e3b11c77_a6e7e0f6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
67
] | [
null
] | [
49
] | [
52
] | |
2024-11-18T20:10:47.312060+00:00 | 1,585,814,865,000 | a8d07f44b5e5f62c514eac70c9a213c623cf280d | 2 | {
"blob_id": "a8d07f44b5e5f62c514eac70c9a213c623cf280d",
"branch_name": "refs/heads/master",
"committer_date": 1585814865000,
"content_id": "1e36f8fadef86e60e98cc44836d4f49b2d622dae",
"detected_licenses": [
"MIT"
],
"directory_id": "9817ffbbe360977e75bc89c50a924592c944b58c",
"extension": "py",
"fi... | 2.359375 | stackv2 | import requests
from flask import Flask, request
from flask_restful import Resource, Api, abort
import werkzeug.exceptions as HTTPStatus
import os.path
import time
import json
import threading
app = Flask(__name__)
api = Api(app)
files = {}
# files = {'amazon_reviews_us_Electronics_v1_00.tsv.gz' : { 'block-0': ['Node... | 295 | 37.31 | 142 | 21 | 2,491 | python | [{"finding_id": "codeql_py/path-injection_db2cdcff4d7b01c4_bb5210c3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 7 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](... | [
224,
225,
245,
245,
248,
272,
274
] | [
null,
null,
null,
null,
null,
null,
null
] | [
29,
31,
26,
49,
22,
27,
26
] | [
37,
39,
29,
52,
25,
30,
29
] | |
2024-11-18T20:10:59.083987+00:00 | 1,658,157,030,000 | 20532a9f8f328d0221fa9e315f8385b80fd07f17 | 3 | {
"blob_id": "20532a9f8f328d0221fa9e315f8385b80fd07f17",
"branch_name": "refs/heads/master",
"committer_date": 1658157030000,
"content_id": "fd69b7d427d953d3f4a49e7bbb5ad9ab6f76807b",
"detected_licenses": [
"MIT"
],
"directory_id": "4fe6eb97cbaddec2aae20524fc7bfe577862a43b",
"extension": "py",
"fi... | 2.78125 | stackv2 | import hashlib
import qobuz
import requests
import time
try:
from urllib.parse import urljoin
except ImportError:
# python2
from urlparse import urljoin
API_URL = "https://www.qobuz.com/api.json/0.2/"
APP_ID = None
APP_SECRET = None
def register_app(app_id, app_secret=None):
"""Save the app's id and... | 174 | 25.19 | 79 | 13 | 1,068 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_07d9cdc07d3bd993_17c190a9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
174
] | [
null
] | [
24
] | [
44
] | |
2024-11-18T20:48:09.886322+00:00 | 1,525,303,844,000 | bc14aa5cdfb91f245808c814644a2f55e41018b2 | 3 | {
"blob_id": "bc14aa5cdfb91f245808c814644a2f55e41018b2",
"branch_name": "refs/heads/master",
"committer_date": 1525303844000,
"content_id": "cb2b6efe37d194a60556e012012aef797e34699a",
"detected_licenses": [
"MIT"
],
"directory_id": "30165a4cb5048ebdfbcbdcc3fc1a971e3b16c9ea",
"extension": "py",
"fi... | 2.71875 | stackv2 | import hashlib
import time
from functools import partial
from typing import Callable, Optional
from web3 import Web3
from web3.contract import Contract
from web3.eth import Eth
from web3.miner import Miner
from web3.personal import Personal
from app.utils.decorators import set_state, check_state, check_and_unset_stat... | 179 | 37.74 | 110 | 16 | 1,506 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b7fccfb5358a775b_a58ccf3a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
131,
139
] | [
null,
null
] | [
58,
35
] | [
75,
52
] | |
2024-11-18T20:48:13.219896+00:00 | 1,508,193,948,000 | 17efa05f0a240e9a48f877944332bec8f257804e | 3 | {
"blob_id": "17efa05f0a240e9a48f877944332bec8f257804e",
"branch_name": "refs/heads/master",
"committer_date": 1508193948000,
"content_id": "06ce3a2d32a89005e974702507834d0e74eb032f",
"detected_licenses": [
"MIT"
],
"directory_id": "2eae8f1c58e35d85943ad16bebb68c7bc3b2485c",
"extension": "py",
"fi... | 2.546875 | stackv2 | from argparse import ArgumentParser
from jinja2 import FileSystemLoader, Environment
from bs4 import BeautifulSoup as bs
import requests
parser = ArgumentParser(description='Create hydra sports page')
parser.add_argument('--file',
dest='filename',
required=True,
... | 35 | 29.51 | 102 | 13 | 266 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fab0ae4012373d90_370694ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
29
] | [
31
] | [
12
] | [
2
] | |
2024-11-18T20:48:27.618219+00:00 | 1,585,558,556,000 | c3aa428c8b2e2653d47bc2a597db130f1ffd0324 | 3 | {
"blob_id": "c3aa428c8b2e2653d47bc2a597db130f1ffd0324",
"branch_name": "refs/heads/master",
"committer_date": 1585558556000,
"content_id": "5c4edfb89779129f91d90edc28ca42f142588531",
"detected_licenses": [
"MIT"
],
"directory_id": "b473e9b27c76f5452be2be12665a8d79da982a0b",
"extension": "py",
"fi... | 2.5625 | stackv2 | import json
import os
import socket
import threading
from tkinter import *
import sys
import time
from tkinter import ttk
from tkinter.tix import ComboBox
import redis as redis
import requests
class tk_t(object):
"""
第一个登陆窗口
"""
def __init__(self):
window = Tk()
self.window = window... | 243 | 30.6 | 134 | 19 | 2,273 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a72b1e003a8f44e0_e2e16052", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
162
] | [
null
] | [
11
] | [
75
] | |
2024-11-18T20:48:31.712271+00:00 | 1,502,303,452,000 | 9ede491f20a95951bfbcd637f59d48cc9537d117 | 3 | {
"blob_id": "9ede491f20a95951bfbcd637f59d48cc9537d117",
"branch_name": "refs/heads/master",
"committer_date": 1502303452000,
"content_id": "49c83715dbeb88829a87689a95b95e741c418ef3",
"detected_licenses": [
"MIT"
],
"directory_id": "17dd5987219954d678e4f63396b78085fc2bcf27",
"extension": "py",
"fi... | 2.671875 | stackv2 | import hashlib
import datetime as date
from flask import Flask
from flask import request
import json
node = Flask(__name__);
class Block:
def __init__(self,index,timestamp,data,prev_hash):
self.index = index
self.timestamp = timestamp
self.data =data #i should encr... | 131 | 23.87 | 118 | 15 | 784 | python | [{"finding_id": "codeql_py/reflective-xss_ab456944eb392d01_348a5286", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
88
] | [
93
] | [
12
] | [
12
] | |
2024-11-18T20:48:32.817542+00:00 | 1,597,238,095,000 | 684aefd37f6ec2d1e2ba67e14da4d8e303939596 | 3 | {
"blob_id": "684aefd37f6ec2d1e2ba67e14da4d8e303939596",
"branch_name": "refs/heads/master",
"committer_date": 1597238095000,
"content_id": "24cd8adb58b6ad73d27a06ff0f941487e0ee0052",
"detected_licenses": [
"MIT"
],
"directory_id": "16937f66a80c89b0700915ea0ad0649bfa8d10c6",
"extension": "py",
"fi... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
"""Module that contains widgets for managing AiiDA lab applications."""
from subprocess import CalledProcessError
import traitlets
import ipywidgets as ipw
from jinja2 import Template
from aiidalab.app import AppVersion
from home.widgets import StatusHTML, Spinner
from home.utils import load_... | 261 | 41.79 | 118 | 18 | 2,279 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9c30d6fa72ff7e69_81762a2a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
66
] | [
74
] | [
16
] | [
20
] | |
2024-11-18T20:48:34.350769+00:00 | 1,620,090,067,000 | 6d55fd3c8d7c632ea809a2ed2e95b0a1a163b244 | 4 | {
"blob_id": "6d55fd3c8d7c632ea809a2ed2e95b0a1a163b244",
"branch_name": "refs/heads/master",
"committer_date": 1620090067000,
"content_id": "c06194b52be691cb1887b9ebd258a036ab495b2b",
"detected_licenses": [
"MIT"
],
"directory_id": "b3544b8617bad8d6a87a7877df5363a1360aa2c4",
"extension": "py",
"fi... | 3.671875 | stackv2 | def main():
full_name = get_full_name()
print()
password = get_password()
print()
email_address = get_email_address()
print()
phone_number = get_phoneno()
print()
print("Hi " + full_name.split()[0], "thanks for creating an account.")
print("we'll text your confirmation code to th... | 63 | 28.13 | 91 | 17 | 435 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3fc903341b18466f_71b86f84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
11
] | [
null
] | [
64
] | [
76
] | |
2024-11-18T21:25:52.950397+00:00 | 1,585,270,193,000 | c96ddc762cc40162589abdb122e7826695d73a1f | 2 | {
"blob_id": "c96ddc762cc40162589abdb122e7826695d73a1f",
"branch_name": "refs/heads/master",
"committer_date": 1585270193000,
"content_id": "09619570056f2a7e1d7b4bbc93a91ddafb0cb149",
"detected_licenses": [
"MIT"
],
"directory_id": "98c6ed9d8ce32bd60cc87ec470c6e5d0ac99dae6",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
import json, re, traceback, shutil, send2trash
import pandas as pd
from datetime import datetime
from collections import deque
from bs4 import BeautifulSoup
from urllib.request import urlopen
from urllib.parse import quote # to correct for instances when listing title is not in ascii encoding
... | 248 | 42.01 | 153 | 22 | 2,233 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_cb8cf6082d89392a_13e7a990", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ethiojobs.net/display-job/', so it ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'ethiojobs.net/display-job/', so it might match more hosts than expected."
] | [
66
] | [
null
] | [
33
] | [
70
] | |
2024-11-18T21:52:15.930301+00:00 | 1,550,477,744,000 | 1f427aeeb7cd418fc6b49562e3c5d98472a6aa35 | 2 | {
"blob_id": "1f427aeeb7cd418fc6b49562e3c5d98472a6aa35",
"branch_name": "refs/heads/master",
"committer_date": 1550477744000,
"content_id": "b4cb1833f475e8edb5996713af2af0292f743701",
"detected_licenses": [
"MIT"
],
"directory_id": "a73623002d3baeaf5a5b6920e600138580b363bf",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import (
Blueprint, flash, g, redirect, render_template, request, url_for
)
from werkzeug.exceptions import abort
from flask_wtf import FlaskForm, RecaptchaField
from flask_wtf.file import FileField
from wtforms import TextField, HiddenField, ValidationError, RadioField,\
BooleanField, SubmitField, ... | 76 | 27.63 | 77 | 14 | 505 | python | [{"finding_id": "codeql_py/path-injection_11420710d281c5a2_24253d62", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
57,
62
] | [
null,
null
] | [
17,
8
] | [
32,
12
] | |
2024-11-18T21:52:27.325303+00:00 | 1,521,157,552,000 | cc8f9d673e5b85bd4ba24e5a81418f27d354121d | 2 | {
"blob_id": "cc8f9d673e5b85bd4ba24e5a81418f27d354121d",
"branch_name": "refs/heads/master",
"committer_date": 1521157552000,
"content_id": "07613bb5267733e96b6a20f4d4b1ffe586df7cad",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0a89b43293484fc29da8591820d4a8117c84c988",
"extension": "py"... | 2.328125 | stackv2 | from cloudant import Cloudant
from flask import Flask, render_template, request, jsonify,make_response
import atexit
import cf_deployment_tracker
import os
import json
import swiftclient.client as swiftclient
from werkzeug.utils import secure_filename
import base64
# Emit Bluemix deployment event
cf_deployment_tracke... | 108 | 31.93 | 113 | 16 | 789 | python | [{"finding_id": "codeql_py/flask-debug_ae61321283a57627_aa09e701", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
108,
87
] | [
null,
null
] | [
5,
19
] | [
51,
27
] | |
2024-11-18T20:31:27.155104+00:00 | 1,510,240,188,000 | 4f0b3dbd4c826373bec2cf0ce57a15689fe235d9 | 2 | {
"blob_id": "4f0b3dbd4c826373bec2cf0ce57a15689fe235d9",
"branch_name": "refs/heads/master",
"committer_date": 1510240188000,
"content_id": "e49c3749e911c855fdfd8b9335b37138f3575d36",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "901b4a5ba3d13202db3d3e4c67151d1bee8279a1",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/python3
'''
Gathers endpoints for services from kubernetes-api and generates a haproxy.cfg from it.
Since not all endpoints should always be exposed, the endpoints have to be annotated to
be considered for haproxy-config generation. The required keywords are
domain - The domain-name under which the service i... | 496 | 32.35 | 100 | 20 | 3,553 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_07fae7580e11be77_bb60505f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
230
] | [
232
] | [
15
] | [
26
] | |
2024-11-18T20:59:46.990095+00:00 | 1,515,620,563,000 | 84c94abe832481fa912d8192f1c696fdea0f61ba | 4 | {
"blob_id": "84c94abe832481fa912d8192f1c696fdea0f61ba",
"branch_name": "refs/heads/master",
"committer_date": 1515620563000,
"content_id": "a8f20406acfc746c90029fc7ec76c3f17b6af5e7",
"detected_licenses": [
"MIT"
],
"directory_id": "300fbb2743c512ff8a05f85958dbd4c400876069",
"extension": "py",
"fi... | 3.5 | stackv2 | #!/usr/bin/env python3
''' Author: c0llision '''
import math
from argparse import ArgumentParser
import secrets
WORDLIST_FILENAME = "wordlist"
DEFAULT_NUM_WORDS = 5
DEFAULT_NUM_CHARS = 4
# charset that results in a password with the lowest possible number of keystrokes on my keyboard:
CHARSET = "1234567890qwertyuiopas... | 55 | 34.33 | 105 | 13 | 523 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dd1d182a90323ee4_62d56a29", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
48
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T21:10:29.343244+00:00 | 1,628,550,733,000 | ba47baa8a891f4c67604df3edb97a031fcb851b3 | 3 | {
"blob_id": "ba47baa8a891f4c67604df3edb97a031fcb851b3",
"branch_name": "refs/heads/master",
"committer_date": 1628550733000,
"content_id": "7d1dbde1779e7554435a38be7a2a0b3462b9b8b5",
"detected_licenses": [
"MIT"
],
"directory_id": "4dffee3dfcd792c8cf77789aba6fb2a352d61f15",
"extension": "py",
"fi... | 2.640625 | stackv2 |
"""
See https://cex.io/rest-api
"""
import hmac
import hashlib
import time
import requests
BASE_URL = 'https://cex.io/api/%s/'
PUBLIC_COMMANDS = {
'currency_limits',
'ticker',
'last_price',
'last_prices',
'convert',
'price_stats',
'order_book',
'trade_history'
}
class Api:
""... | 194 | 29.06 | 145 | 19 | 1,374 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9d726606ca60d3ae_1df80e0f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
38
] | [
null
] | [
74
] | [
97
] | |
2024-11-18T21:10:49.221446+00:00 | 1,624,895,936,000 | 4223995b56a542d9ae50b5956b5f537473841802 | 2 | {
"blob_id": "4223995b56a542d9ae50b5956b5f537473841802",
"branch_name": "refs/heads/main",
"committer_date": 1624895936000,
"content_id": "f7ae3c7bf5a97046954fb7adeb70e5736bfde139",
"detected_licenses": [
"MIT"
],
"directory_id": "524b53f7cffbcd26b756704a46be602bbb89c654",
"extension": "py",
"file... | 2.328125 | stackv2 | import os
import string
import random
import hashlib
import subprocess
import time
import json
import secrets
from models import db_session
from models.users import User
from models.tests import Test
from models.forums import Forum
db_session.global_init('database.db')
def hash_password(password):
h = hashlib.md5(p... | 207 | 18.98 | 65 | 18 | 1,067 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ccd7d3cb5b4ee520_04cc74e0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
18
] | [
null
] | [
18
] | [
35
] | |
2024-11-18T21:10:51.629988+00:00 | 1,534,333,609,000 | 18f32f68fad3a83dba82fca70433ce6bbaf27a15 | 2 | {
"blob_id": "18f32f68fad3a83dba82fca70433ce6bbaf27a15",
"branch_name": "refs/heads/master",
"committer_date": 1534333609000,
"content_id": "847e3930c79d2e7dd202c164173c7ed85ac714de",
"detected_licenses": [
"MIT"
],
"directory_id": "590c98afd17ca45bf6b10f3744191f0040387e53",
"extension": "py",
"fi... | 2.359375 | stackv2 | # coding: utf-8
import os
import requests
import sys
from bottle import route, run, static_file, get, post, request, template
from dotenv import load_dotenv
import speech_recognition as sr
reload(sys)
sys.setdefaultencoding('utf8')
# Load environment file for config.
load_dotenv(os.getcwd() + '/.env')
@route('/')
d... | 86 | 29.44 | 132 | 18 | 684 | python | [{"finding_id": "codeql_py/full-ssrf_d240b412e0dedf72_96b01f94", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 3 | true | [
"CWE-918",
"CWE-022",
"CWE-022"
] | [
"py/full-ssrf",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
51,
52,
64
] | [
null,
null,
null
] | [
15,
10,
17
] | [
95,
23,
30
] | |
2024-11-18T21:10:56.355011+00:00 | 1,517,375,209,000 | 012ba072bb4c39834f769b31bcefbbc274f9ef8e | 3 | {
"blob_id": "012ba072bb4c39834f769b31bcefbbc274f9ef8e",
"branch_name": "refs/heads/master",
"committer_date": 1517375209000,
"content_id": "54e4fba91aa6bb712dbbc49b33a3454be8dea84d",
"detected_licenses": [
"MIT"
],
"directory_id": "a23f45904788a43cd60b76cf1748b18475b15062",
"extension": "py",
"fi... | 2.859375 | stackv2 | try:
from urlparse import urljoin
except ImportError:
from urllib.parse import urljoin
import os
import glob
import shutil
import threading
from time import sleep
import requests
import img2pdf
from bs4 import BeautifulSoup
source = [
"https://www.mangatown.com/manga/",
"http://www.mangareader.net/"
]
... | 201 | 35.99 | 170 | 27 | 1,809 | python | [{"finding_id": "codeql_py/request-without-cert-validation_486141cbde2fcddb_1b54582d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
157
] | [
null
] | [
11
] | [
54
] | |
2024-11-18T21:23:34.115917+00:00 | 1,631,388,510,000 | 366bbd97ab714348858a00d9fcf01cc9446fb372 | 3 | {
"blob_id": "366bbd97ab714348858a00d9fcf01cc9446fb372",
"branch_name": "refs/heads/main",
"committer_date": 1631388510000,
"content_id": "f508f69a0180e05abd330a74cdf845576e28f650",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "89a1fc9591f2d0585b2193cf2ba5a34ff1710781",
"extension": "py"... | 2.65625 | stackv2 | import os
import json
from os import listdir
from os.path import isfile, join
from jinja2 import Environment, FileSystemLoader
import inflect
p = inflect.engine()
templates_folder = './templates/'
input_folder = './input/'
serveur_template_file = 'app.tpl'
home_page_template_file = 'home_page.tpl'
def load_file(_fil... | 55 | 24.85 | 91 | 15 | 355 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ef940c21107c274e_c7d1501a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38,
47
] | [
null,
null
] | [
7,
7
] | [
61,
61
] | |
2024-11-18T21:23:35.833096+00:00 | 1,431,387,677,000 | 2a46281b353a3a374360a00b9385f842c112cccc | 3 | {
"blob_id": "2a46281b353a3a374360a00b9385f842c112cccc",
"branch_name": "refs/heads/master",
"committer_date": 1431387677000,
"content_id": "c7f77981f6e12d413f513e39c6195a3a0f2946e7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c9f4fa3ee8b41afe54300c4e05bc996e0c2e456c",
"extension": "p... | 2.5625 | stackv2 | #!/usr/bin/env python
"""
A test of a simple qdo server
Stephen, Shreyas, and Gonzalo
Spring 2015
"""
import json
import requests
from flask import Flask, url_for, make_response
import flask
app = Flask(__name__)
__version__ = "0.1"
#-------------------------------------------------------------------------
#- Log... | 109 | 33.5 | 124 | 16 | 892 | python | [{"finding_id": "codeql_py/insecure-cookie_3fdfbdc56ea2214f_d0e3f2ab", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 5 | true | [
"CWE-614",
"CWE-614",
"CWE-312",
"CWE-1004",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/insecure-cookie",
"py/clear-text-storage-sensitive-data",
"py/client-exposed-cookie",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"This expression stores [sensitive data (password)](1) as clear text.",
"Sensitive server cookie is set without HttpOnly flag.",
"Sensitive server cookie is set without Htt... | [
38,
39,
38,
38,
39
] | [
null,
null,
null,
null,
null
] | [
9,
9,
44,
9,
9
] | [
67,
69,
66,
67,
69
] | |
2024-11-18T21:59:02.559208+00:00 | 1,571,652,665,000 | 6074ce95f72a99c44678113896728d9015b5e0bd | 3 | {
"blob_id": "6074ce95f72a99c44678113896728d9015b5e0bd",
"branch_name": "refs/heads/master",
"committer_date": 1571652665000,
"content_id": "34b4a9119a22421d116acc8b22e777af70525db5",
"detected_licenses": [
"MIT"
],
"directory_id": "567a0bd85d22e3a94ab482b0431619e95a572e38",
"extension": "py",
"fi... | 2.75 | stackv2 | # Youtube video crawling
# /usr/bin/python3
import json
import sys
import os
import argparse
import requests as rq
from pytube import YouTube as yt, Playlist as pl
from bs4 import BeautifulSoup as bs
YOUTUBE_URL = 'https://www.youtube.com'
# YOUTUBE_DOWNLOAD_URL = 'https://www.ssyoutube.com'
SAVE_DIRECTORY = "/Downloa... | 154 | 33.39 | 98 | 25 | 1,216 | python | [{"finding_id": "codeql_py/overly-permissive-file_51cd51da162e2158_ee6115a5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
31
] | [
null
] | [
13
] | [
38
] | |
2024-11-18T21:59:04.546212+00:00 | 1,607,659,155,000 | cf0dac9107c32cbd64d80c7892a65b129ba91f60 | 3 | {
"blob_id": "cf0dac9107c32cbd64d80c7892a65b129ba91f60",
"branch_name": "refs/heads/master",
"committer_date": 1607659155000,
"content_id": "0da4b24e54b0f1a2b7fac9faa40c839d0f5b498c",
"detected_licenses": [
"Unlicense"
],
"directory_id": "8df99d7750096b9c793aa2cca0736a8192ab1fa4",
"extension": "py",... | 3.453125 | stackv2 |
def main():
chenyang = Wages(21000, 1698.92, 3500)
print(chenyang.salary)
print(chenyang.YearSalary)
print(chenyang.PersonalIncomeTax())
print(chenyang.pretax())
print(chenyang.aftertax())
print(chenyang.afterincome())
class Wages():
def __init__(self, salary, social, special, other... | 105 | 25.48 | 116 | 14 | 840 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b7965ef93de0d98_aaf5bb69", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
6,
7
] | [
null,
null
] | [
11,
11
] | [
26,
30
] | |
2024-11-18T21:59:15.710072+00:00 | 1,508,726,756,000 | 279438939119e50fc7b2463af5e7bf2d49d88e6b | 3 | {
"blob_id": "279438939119e50fc7b2463af5e7bf2d49d88e6b",
"branch_name": "refs/heads/master",
"committer_date": 1508726756000,
"content_id": "bd6665c4c23f26872ff4988be15a4a7d355c8b5e",
"detected_licenses": [
"MIT"
],
"directory_id": "f073d4da7fa70cc3dc63a95a5d506b720934f867",
"extension": "py",
"fi... | 2.53125 | stackv2 | __author__ = 'sunary'
from htmlmin.main import minify
from flask import request, Response, make_response, current_app, redirect, json, wrappers, url_for
from functools import update_wrapper
import gzip
import time
try:
from StringIO import StringIO
except ImportError:
from io import StringIO
class FlaskOpt... | 231 | 36.67 | 114 | 23 | 1,705 | python | [{"finding_id": "codeql_py/url-redirection_6698a6f70f3d059f_ace36110", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
126
] | [
null
] | [
45
] | [
57
] | |
2024-11-18T22:11:32.733386+00:00 | 1,690,748,653,000 | b09c30b7ff7c0a99c1ca459c1828815d0d398733 | 2 | {
"blob_id": "b09c30b7ff7c0a99c1ca459c1828815d0d398733",
"branch_name": "refs/heads/master",
"committer_date": 1690748653000,
"content_id": "baf837eb80205a7cfed0da37d1c6807adc86a6f9",
"detected_licenses": [
"MIT"
],
"directory_id": "7aca190d797fd4f0509d1f14e88418a48fdaeb7e",
"extension": "py",
"fi... | 2.390625 | stackv2 | """
Created on May 24, 2016
@author: iticus
"""
import asyncio
import datetime
import hashlib
import logging
from functools import partial
from typing import Any, Callable
import aiohttp_jinja2
from aiohttp import web
from aiohttp.web_fileresponse import FileResponse
from aiohttp_session import get_session, new_sess... | 274 | 37.14 | 120 | 18 | 2,287 | python | [{"finding_id": "codeql_py/url-redirection_e6717680ba352bbf_7c54ffec", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-117"
] | [
"py/url-redirection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
91,
194
] | [
null,
null
] | [
30,
66
] | [
38,
74
] | |
2024-11-18T22:11:38.251862+00:00 | 1,493,045,968,000 | 355ebde6399ae97c55d1de3943d202b800248107 | 2 | {
"blob_id": "355ebde6399ae97c55d1de3943d202b800248107",
"branch_name": "refs/heads/master",
"committer_date": 1493045968000,
"content_id": "46edc33acdb30acdf31bbbbf6ace4237d48a715a",
"detected_licenses": [
"MIT"
],
"directory_id": "3de215098a63d194aee8aeaff430b9f2975d6e88",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
import pathlib
import tarfile
import boto3
from botocore.handlers import disable_signing
from scipy.io import loadmat
from scipy.misc import imread
import numpy as np
from skimage.transform import resize
def list_files(base_path, validExts=(".jpg", ".jpeg", ".png", ".bmp"), contains=None):
# loop ove... | 149 | 36.63 | 104 | 18 | 1,348 | python | [{"finding_id": "codeql_py/tarslip_55a9d410c93038d8_678874d0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
72
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T22:11:52.505546+00:00 | 1,446,863,767,000 | a91efbbfce526c267cbdccee94fb4ecc05dd701a | 3 | {
"blob_id": "a91efbbfce526c267cbdccee94fb4ecc05dd701a",
"branch_name": "refs/heads/master",
"committer_date": 1446863767000,
"content_id": "41af6d7be7a7415bdcf1ee0cbd381c76e13df6fe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a5d430ba44f9bea1a7b995792bba99e2eaadcbe4",
"extension": "py"... | 2.515625 | stackv2 | import re
from easyspider.spider import EasySpider
from easyspider.cron import every
class Spider(EasySpider):
@every(crontab=["* * * */10 *", "* * */5 * *"])
def on_start(self):
print("douban spider start")
self.fetch("http://movie.douban.com/", callback=self.index_movie)
def index_... | 22 | 35 | 81 | 15 | 192 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_f3142a63f6ecf1ab_1e766a72", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected."
] | [
16
] | [
null
] | [
26
] | [
63
] | |
2024-11-18T22:23:59.029992+00:00 | 1,448,228,345,000 | 29fea9df01a4efc189741e8ee298c2d2ca53e858 | 3 | {
"blob_id": "29fea9df01a4efc189741e8ee298c2d2ca53e858",
"branch_name": "refs/heads/master",
"committer_date": 1448228345000,
"content_id": "78f4ab83020f430a7764faebee8515c95a9c9538",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "58a6612055d78a78181c192c8dbc2fbe7e2404c4",
"extension": "py"... | 2.546875 | stackv2 | #!/usr/bin/env python
"""recipy - a frictionless provenance tool for Python
Usage:
recipy search [options] <outputfile>
recipy latest [options]
recipy gui [options]
recipy annotate [options]
recipy (-h | --help)
recipy --version
Options:
-h --help Show this screen
--version Show version
-a -... | 270 | 24.05 | 106 | 23 | 1,693 | python | [{"finding_id": "codeql_py/bind-socket-all-network-interfaces_7317963d23dae2dd_2c09e65f", "tool_name": "codeql", "rule_id": "py/bind-socket-all-network-interfaces", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "'' binds a socket to all interfaces.", "remediation": "", "location": {"... | 3 | true | [
"CWE-200",
"CWE-200",
"CWE-079"
] | [
"py/bind-socket-all-network-interfaces",
"py/bind-socket-all-network-interfaces",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"'' binds a socket to all interfaces.",
"'' binds a socket to all interfaces.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
166,
176,
83
] | [
null,
null,
null
] | [
15,
11,
16
] | [
39,
26,
52
] | |
2024-11-18T22:24:02.709613+00:00 | 1,589,267,474,000 | 72dfdf7285902a903e3003227f218db48f77186a | 4 | {
"blob_id": "72dfdf7285902a903e3003227f218db48f77186a",
"branch_name": "refs/heads/master",
"committer_date": 1589267474000,
"content_id": "146fd876a1f461a457d81778ec2c8d7eae717457",
"detected_licenses": [
"MIT"
],
"directory_id": "7e25a6fd522a43660fdc486be2b401ea57df453f",
"extension": "py",
"fi... | 3.71875 | stackv2 | # https://en.wikipedia.org/wiki/Bulls_and_Cows
# pair programed this with kid on 2020/05/02; main code done by me,
# focused on clear function/variable naming, top-down functions(divide and conquer),
# minimal testable code and detailed verifications.
#
# this is the game portion, solution is in different file, see bul... | 97 | 24.8 | 89 | 14 | 814 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f2b472ad30357c09_d072feaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
49
] | [
null
] | [
13
] | [
26
] | |
2024-11-18T22:24:07.346789+00:00 | 1,363,421,996,000 | 9375b5790c834a99dc0f26b2f12a2922642d8d1c | 2 | {
"blob_id": "9375b5790c834a99dc0f26b2f12a2922642d8d1c",
"branch_name": "refs/heads/master",
"committer_date": 1363421996000,
"content_id": "83431ab35703d54125404f683c89727ccc432d6d",
"detected_licenses": [
"MIT"
],
"directory_id": "830e1e8ecb7d3521638ce8ca74df03dd44314c4b",
"extension": "py",
"fi... | 2.4375 | stackv2 | import logging
from datetime import timedelta
from urlparse import (
urlparse,
urlunparse,
urljoin
)
import cssutils
import DNS
import requests
from bs4 import BeautifulSoup
from django.core.urlresolvers import reverse
from django.db import models
from django.utils import timezone
from Crypto.Cipher impor... | 379 | 29.04 | 81 | 24 | 2,483 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_55d7563285b6cce5_e4f3a058", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used."
] | [
85,
91
] | [
null,
null
] | [
26,
16
] | [
46,
46
] | |
2024-11-18T22:24:18.547517+00:00 | 1,401,758,447,000 | 1b66ce0852743b15cccb76ce633ad4f9fa568f4a | 2 | {
"blob_id": "1b66ce0852743b15cccb76ce633ad4f9fa568f4a",
"branch_name": "refs/heads/master",
"committer_date": 1401758447000,
"content_id": "819f0418208acd00fe8b86e06c8a83923e9da711",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4751eb702c2543ca68c0c1444a85d741d5251fcf",
"extension": "py"... | 2.328125 | stackv2 | # Copyright 2013 dotCloud inc.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed t... | 123 | 31.53 | 79 | 14 | 949 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3cf786f9cc32d9e8_0d90b6ca", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [index.docker.io](1) may be at an arbitrary position in... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [index.docker.io](1) may be at an arbitrary position in the sanitized URL."
] | [
51
] | [
null
] | [
8
] | [
37
] | |
2024-11-18T22:24:25.378381+00:00 | 1,613,791,333,000 | f6a5f9a201bfc254746ca4abe2b7c2c0b58977a9 | 2 | {
"blob_id": "f6a5f9a201bfc254746ca4abe2b7c2c0b58977a9",
"branch_name": "refs/heads/master",
"committer_date": 1613791333000,
"content_id": "f593e2207d0034d6cec5d15561ea687d654f627e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81dd8d6f0f1ccb1ef17d4a9be6369d673f299e43",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/python
#!coding=utf-8
import telnetlib
import time
import threading
import sys
import os
import yaml
import argparse
class ConfigBackup:
def __init__(self, ip_addr, debug=False, **kwargs):
if 'port' in kwargs:
port = kwargs['port']
else:
port = 23
try:
... | 240 | 27.63 | 111 | 20 | 1,608 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f3f13776364d7a11_ad2904be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 9 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
23,
29,
47,
52,
61,
80,
86,
146,
152
] | [
26,
32,
50,
55,
64,
83,
89,
149,
155
] | [
30,
30,
30,
30,
30,
34,
34,
26,
22
] | [
14,
14,
14,
14,
14,
18,
18,
14,
6
] | |
2024-11-18T22:35:56.275574+00:00 | 1,565,090,854,000 | 4b2e5263bbfe14f8ad202e2a829c71299559dc4c | 2 | {
"blob_id": "4b2e5263bbfe14f8ad202e2a829c71299559dc4c",
"branch_name": "refs/heads/master",
"committer_date": 1565090854000,
"content_id": "9e25c8aa556e824e35ab9eab5410fbcc8093c9ba",
"detected_licenses": [
"MIT"
],
"directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c",
"extension": "py",
"fi... | 2.375 | stackv2 | #coding:utf-8
import socket,sys
import cx_Oracle
def oracleburp(ip,port):
addr = (ip,int(port))
with open('oracle\user.txt') as user:
users = user.readlines()
user.close()
with open('oracle\pass.txt') as passs:
passwords = passs.readlines()
passs.close()
sock_1521 = socket.... | 34 | 24.26 | 100 | 18 | 221 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_edd0471d9169b515_ae6029ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
38
] | [
100
] | |
2024-11-18T22:36:03.929705+00:00 | 1,686,846,777,000 | 2caf16452d8a3c82922ed9ee1a3aecdc0054cab4 | 3 | {
"blob_id": "2caf16452d8a3c82922ed9ee1a3aecdc0054cab4",
"branch_name": "refs/heads/master",
"committer_date": 1686846777000,
"content_id": "0bdfb84de69234871bd5fcc9921445dd508ff6ab",
"detected_licenses": [
"MIT"
],
"directory_id": "cccb39f0c9916397dc9ee9a8326cefdb3027df6b",
"extension": "py",
"fi... | 3.28125 | stackv2 | # 4% rule
def calc_lump_sum(core):
return 25 * 12 * core
core = 1000 # assume core expenses 1000 a month
lump = calc_lump_sum(core)
rate = 0.07
def compound_year (initial, monthly, rate):
annual = 12 * monthly
return (annual + initial) * (1 + rate)
def compound_years (initial, monthly, rate, years):
... | 45 | 27.67 | 149 | 12 | 479 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f2ed4cbf186db345_070f9f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
45
] | [
null
] | [
11
] | [
51
] | |
2024-11-18T22:36:17.409575+00:00 | 1,622,930,580,000 | 371ddaa245ee1b2d2c86bf1ddbc78a9ceca8500b | 3 | {
"blob_id": "371ddaa245ee1b2d2c86bf1ddbc78a9ceca8500b",
"branch_name": "refs/heads/main",
"committer_date": 1622930580000,
"content_id": "7e27ac358ba2bae4fd00a134ad08ddcf4271601d",
"detected_licenses": [
"MIT"
],
"directory_id": "8c966aaaaf3f653ba6df1b2f132a38f7cd001453",
"extension": "py",
"file... | 2.5625 | stackv2 | import jwt
from flask import jsonify, request
import datetime
from functools import wraps
from security.admins import db
from os import getcwd
from models.models import *
def get_secret_key():
path = os.path.dirname(os.path.realpath(__file__)) + '/security/secret_key.txt'
file = open(path)
key = file.read... | 91 | 26.27 | 133 | 18 | 623 | python | [{"finding_id": "codeql_py/stack-trace-exposure_19f4d3a8557832e5_a2dfeb65", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
59
] | [
null
] | [
28
] | [
48
] | |
2024-11-18T22:36:23.804924+00:00 | 1,592,937,781,000 | 2f283485757b410ffc343c907cd88b078ad653be | 2 | {
"blob_id": "2f283485757b410ffc343c907cd88b078ad653be",
"branch_name": "refs/heads/master",
"committer_date": 1592937781000,
"content_id": "8bea341797bcf6341af72fb49d042b895d460bbc",
"detected_licenses": [
"MIT"
],
"directory_id": "2eb027650d1c447ae2778e64b4b3824a8188f882",
"extension": "py",
"fi... | 2.453125 | stackv2 | import cv2
import base64
import urllib.request
import numpy as np
import os
from darkflow.net.build import TFNet
from flask import Flask, request, url_for
from werkzeug.utils import secure_filename
UPLOAD_FOLDER = "/tmp/photos/"
ALLOWED_EXTENSIONS = {"txt", "pdf", "png", "jpg", "jpeg", "gif"}
app = Flask(__name__)
... | 84 | 26.88 | 87 | 16 | 594 | python | [{"finding_id": "codeql_py/flask-debug_dfa95de63fb136d2_9d0ec67c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
84,
34
] | [
null,
null
] | [
5,
14
] | [
40,
46
] | |
2024-11-18T22:36:40.123965+00:00 | 1,501,533,363,000 | 9dc02592d4f324049c63b62d5f5d540943581799 | 2 | {
"blob_id": "9dc02592d4f324049c63b62d5f5d540943581799",
"branch_name": "refs/heads/master",
"committer_date": 1501533363000,
"content_id": "3092ba5941eb48ef94b322174da02cab103e9fa5",
"detected_licenses": [
"MIT"
],
"directory_id": "e46ba5a574bfe5c605734d01f9cb9691a334c3d9",
"extension": "py",
"fi... | 2.421875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import socket
import sys
import time
import signal
from struct import unpack
import argparse
this = sys.modules[__name__]
VERSION = '0.1a'
RELEASE = 'Development'
if sys.version_info[0] < 3:
# Python 3 required for command line execution
raise AssertionError("M... | 335 | 31.64 | 116 | 20 | 2,692 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0f306b12fe25585_915aff14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
136
] | [
139
] | [
15
] | [
58
] | |
2024-11-18T20:23:16.875015+00:00 | 1,497,028,131,000 | 4b0c41119e5f435cd86d2179a3d1d11149ce7487 | 3 | {
"blob_id": "4b0c41119e5f435cd86d2179a3d1d11149ce7487",
"branch_name": "refs/heads/master",
"committer_date": 1497028131000,
"content_id": "415dd98625362a20c740942ec271e028a4994f56",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a433c2fdb12b40117eae55ba0f932b298efb1b24",
"extension": "p... | 3.265625 | stackv2 | ##
#
import random
erros=0
acertos=[]
digitadas=[]
def main():
print("="*39)
print("="*12, "Jogo da Forca", "="*12)
print("="*39)
embaralha()
opcao()
print("="*39)
def imprimir():
print("Palavra Chave -> %s"%senha)
print("Você errou %d vezes"%erros)
print("Letras digitadas")
... | 125 | 23.99 | 117 | 16 | 829 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86c9707ccfcf387a_c2ae1fcb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
36,
102
] | [
null,
null
] | [
15,
23
] | [
16,
24
] | |
2024-11-18T20:23:35.452885+00:00 | 1,420,834,490,000 | f812f1efbdd45835c8bb2b9ec9534fef96ae2633 | 2 | {
"blob_id": "f812f1efbdd45835c8bb2b9ec9534fef96ae2633",
"branch_name": "refs/heads/master",
"committer_date": 1420834490000,
"content_id": "5bdce1d599c60282f9156982162c761c4bd3b8e2",
"detected_licenses": [
"MIT"
],
"directory_id": "4c22364e9b43ae5b8ccf250430be3b437ff00f3d",
"extension": "py",
"fi... | 2.34375 | stackv2 | from flask import render_template, flash, redirect, url_for, request, g, jsonify
from flask.ext.login import login_user, logout_user, current_user, login_required
from infrastructure import app, lm, db
from forms import LoginForm, RegistrationForm
from models import User, Token, Match
import models
@app.route('/', me... | 85 | 30.64 | 120 | 17 | 570 | python | [{"finding_id": "codeql_py/url-redirection_ea64741fa4aa5f76_e8d2f146", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
50
] | [
null
] | [
29
] | [
73
] | |
2024-11-18T21:22:14.204214+00:00 | 1,493,219,475,000 | c6bcada86afd36385e8cbe0dc19bfc3591cb69c5 | 3 | {
"blob_id": "c6bcada86afd36385e8cbe0dc19bfc3591cb69c5",
"branch_name": "refs/heads/master",
"committer_date": 1493219475000,
"content_id": "cf9f0f845183cd8bf08a0a7c34874bb2abd0ea9d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61c1dd56b86e3fd29b7d9c78e0c2757b2da1e890",
"extension": "py"... | 2.609375 | stackv2 | #Copyright [yyyy] [name of copyright owner]
#Licensed under the Apache License, Version 2.0 (the "License");
#you may not use this file except in compliance with the License.
#You may obtain a copy of the License at
#http://www.apache.org/licenses/LICENSE-2.0
#Unless required by applicable law or agreed to in wr... | 439 | 23.36 | 151 | 17 | 3,116 | python | [{"finding_id": "codeql_py/partial-ssrf_dfab67cc6a3b1483_11418977", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 3 | true | [
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of ... | [
93,
120,
131
] | [
null,
null,
null
] | [
4,
4,
4
] | [
72,
58,
61
] | |
2024-11-18T21:23:17.285946+00:00 | 1,691,903,891,000 | 47b3a3c35249cbeffd5225a0a4f7aa8f203e5d98 | 2 | {
"blob_id": "47b3a3c35249cbeffd5225a0a4f7aa8f203e5d98",
"branch_name": "refs/heads/master",
"committer_date": 1691903891000,
"content_id": "6d30026f02811321d0a8d88511e4b56c789be0ea",
"detected_licenses": [
"MIT"
],
"directory_id": "3b357a468e608958745ff7c72be35a5f9d83de72",
"extension": "py",
"fi... | 2.40625 | stackv2 | import click
import requests
import yaml
from dtoolcore import iter_datasets_in_base_uri
from dtool_lookup_server.utils import generate_dataset_info
def get_projects(fpath):
"""Return projects dictionary."""
with open(fpath) as fh:
projects = yaml.load(fh, Loader=yaml.FullLoader)
return projects... | 162 | 30.15 | 78 | 15 | 1,031 | python | [{"finding_id": "codeql_py/request-without-cert-validation_15f5a2db416b652f_71049e05", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
30,
52,
78,
99
] | [
35,
57,
83,
104
] | [
20,
16,
20,
24
] | [
10,
6,
10,
14
] | |
2024-11-18T21:23:18.255786+00:00 | 1,571,769,507,000 | 389da327377a3b22213ae9c9ae3c2cb43b36f32f | 3 | {
"blob_id": "389da327377a3b22213ae9c9ae3c2cb43b36f32f",
"branch_name": "refs/heads/master",
"committer_date": 1571769507000,
"content_id": "6670326189fc7e5810ba4c8bfdb2b0438f969d1b",
"detected_licenses": [
"MIT"
],
"directory_id": "5c223be5b0bde3f474ecadcaf806d2c17acd9c6a",
"extension": "py",
"fi... | 2.859375 | stackv2 | # HackRU Fall 2019
# SMS Recommendation
# Uses Google Places API to get nearby locations through sms instead of data
# Authors:
# Sohan Ganguli (@engineeringmamba)
# Krzysztof Grochal (@KrzysGro)
# ZiJun Weng (@AtelierSilver)
#
import googlemaps
import requests
import json
import pycodestyle
import ssl
from uszipcode i... | 88 | 25.68 | 166 | 16 | 626 | python | [{"finding_id": "codeql_py/partial-ssrf_6bb4b84dd0b46233_33d34fca", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
58
] | [
59
] | [
16
] | [
110
] | |
2024-11-18T21:23:18.810694+00:00 | 1,603,179,913,000 | 4b8589a8ea72f9dd13d2ec875182fc127990d430 | 3 | {
"blob_id": "4b8589a8ea72f9dd13d2ec875182fc127990d430",
"branch_name": "refs/heads/master",
"committer_date": 1603179913000,
"content_id": "78a0ff7483419f282d439c29b9990d9c72253ee8",
"detected_licenses": [
"MIT"
],
"directory_id": "e3354e6fb168b5d96ac20a47c6df48aa3466215c",
"extension": "py",
"fi... | 3.171875 | stackv2 | # -*- coding: utf-8 -*-
import sys
import re
import posixpath
from typing import List
# Default accepted languages - these are the ones recognized by langdetect
KNOWN_LANG_TAGS = ['af', 'ar', 'bg', 'bn', 'ca', 'cs', 'cy', 'da', 'de', 'el',
'en', 'es', 'et', 'fa', 'fi', 'fr', 'gu', 'he', 'hi', 'hr',... | 157 | 28.5 | 79 | 13 | 1,150 | python | [{"finding_id": "codeql_py/overly-large-range_44d0652c11d8082c_3c7629e8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
42
] | [
null
] | [
31
] | [
34
] | |
2024-11-18T21:51:27.597697+00:00 | 1,580,982,782,000 | fb5822d6e47bb08376fd1336d38a300207cd24d0 | 3 | {
"blob_id": "fb5822d6e47bb08376fd1336d38a300207cd24d0",
"branch_name": "refs/heads/master",
"committer_date": 1580982782000,
"content_id": "65a442e556220e850075468ec46231585cb90de4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "adf30eaa4fd6fd640860bdaa661e2b3cc028f8b6",
"extension": "py"... | 2.515625 | stackv2 | def No_date_special_characters(fle, fleName, target):
import re
import os
import sys
import json
import openpyxl
import pandas as pd
from pandas import ExcelWriter
from pandas import ExcelFile
from dateutil.parser import parse
import validators
configFile = 'https://s3.us-east.cloud-object-storage.appdomain... | 71 | 33.24 | 114 | 25 | 652 | python | [{"finding_id": "codeql_py/overly-large-range_51cee27b3ce400bd_a41f5b26", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
29
] | [
null
] | [
52
] | [
55
] | |
2024-11-18T21:51:31.047583+00:00 | 1,626,167,191,000 | 4cb3224dbfd10873af0cdf4e323f82e826c8d7d2 | 2 | {
"blob_id": "4cb3224dbfd10873af0cdf4e323f82e826c8d7d2",
"branch_name": "refs/heads/main",
"committer_date": 1626167191000,
"content_id": "0ca740ba4ceca02ba5b88789c903da2ded15a107",
"detected_licenses": [
"MIT"
],
"directory_id": "7306350e914ba6c8e5563250b1565f0d3466608d",
"extension": "py",
"file... | 2.421875 | stackv2 | import sys
from PyQt5.QtCore import *
from PyQt5.QtGui import *
from PyQt5.QtWidgets import *
import paramiko
class Window(QWidget):
def __init__(self, parent = None):
QWidget.__init__(self, parent)
self.setGeometry(100,100,256,128)
self.loginFrame = QFrame()
self.usernameBox = QLi... | 89 | 33.65 | 102 | 12 | 652 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_288a0b585fbd3f21_148ce3b7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
65,
76
] | [
null,
null
] | [
9,
9
] | [
73,
73
] | |
2024-11-18T21:52:00.764778+00:00 | 1,635,184,707,000 | 8316d9de702578ba7adae575abb562a1e2b48441 | 3 | {
"blob_id": "8316d9de702578ba7adae575abb562a1e2b48441",
"branch_name": "refs/heads/main",
"committer_date": 1635184707000,
"content_id": "7be6c65253fd1c815b77ca95ee4ddc9ada2edb58",
"detected_licenses": [
"MIT"
],
"directory_id": "343bfcfd80fe1dc0aa8c691370b02c0ec4e99b60",
"extension": "py",
"file... | 2.515625 | stackv2 | from flask import Blueprint, render_template, request
contact = Blueprint('contact', __name__)
# connect to your Mongo DB database
# client = pymongo.MongoClient(f"mongodb+srv://{user}:{password}@clusterforproject.ddxhn.mongodb.net/{database}?"
# + "retryWrites=true&w=majority")
# # get th... | 55 | 38.09 | 113 | 18 | 443 | python | [{"finding_id": "codeql_py/reflective-xss_4168870bc8db55cb_7bbc628e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
27
] | [
null
] | [
20
] | [
27
] | |
2024-11-18T21:52:10.878618+00:00 | 1,631,168,797,000 | 734c553f1f1b6e66681629ca3bc4a981a15683dd | 3 | {
"blob_id": "734c553f1f1b6e66681629ca3bc4a981a15683dd",
"branch_name": "refs/heads/main",
"committer_date": 1631168797000,
"content_id": "1744da7568d4c859ea52fb5b9680853970bffd4c",
"detected_licenses": [
"MIT"
],
"directory_id": "6738b1a0eda1113c0d97e7918f745edda7e60dd8",
"extension": "py",
"file... | 2.671875 | stackv2 | import datetime as dt
import random
import pandas
import smtplib
# Change the information below
SENDER_NAME = 'John Doe'
MY_EMAIL = 'example@gmail.com'
TO_EMAIL = 'example@gmail.com'
PASSWORD = 'example'
now = dt.datetime.now()
current_month = now.month
current_day = now.day
data = pandas.read_csv('birthdays.csv')
b... | 40 | 30.73 | 81 | 16 | 284 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab4e46504fed4130_217fbe57", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
18
] | [
null
] | [
7
] | [
20
] | |
2024-11-18T22:02:46.452373+00:00 | 1,632,943,660,000 | e7311cbc9ab5ac655885a5548d59fe245c20919c | 3 | {
"blob_id": "e7311cbc9ab5ac655885a5548d59fe245c20919c",
"branch_name": "refs/heads/master",
"committer_date": 1632943660000,
"content_id": "85bff49dc46cf515e4c83dd87707cad088f43ab8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39cfe0bd795b0c32976c1114c245844342b3115f",
"extension": "py"... | 2.71875 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
import tensorflow as tf
from tensorflow import keras
from utils import load_data_set, load_image_test, map_prediction_to_mask, compare_accuracy, labeled_prediction_to_image, \
count_files_in_folder, files_in_folder
from metrics import iou_coef, dice_coef, ... | 95 | 39.56 | 122 | 12 | 820 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7d526f9fed88a2cf_1cceb31e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T22:02:48.622794+00:00 | 1,556,607,827,000 | d183d2bf36efeb1332bd247c92b8e3c13132f8b6 | 3 | {
"blob_id": "d183d2bf36efeb1332bd247c92b8e3c13132f8b6",
"branch_name": "refs/heads/master",
"committer_date": 1556607827000,
"content_id": "0c67dd9aaec3e64ef6ba793931dd94b32bde0407",
"detected_licenses": [
"MIT"
],
"directory_id": "f616fad46a6dd0acfb058a5e189ac7e487d524a0",
"extension": "py",
"fi... | 2.75 | stackv2 | #coding=utf-8
import http.client
import hashlib
from urllib import parse
import random
def translate(txt_input):
appid = '20190416000288427' #你的appid
secretKey = 'OjhiDsnJagVUOxAoqxSz' #你的密钥
httpClient = None
myurl = '/api/trans/vip/translate'
q = txt_input
#'我他妈要红色高跟鞋\n'
fromLang = 'zh'
... | 84 | 27.1 | 119 | 19 | 750 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4ed1b2f8b8747b79_19792977", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
19
] | [
null
] | [
15
] | [
44
] | |
2024-11-18T22:16:43.096233+00:00 | 1,551,318,940,000 | 195fec4dfeeef75f82e789159bf4c488f2ece126 | 4 | {
"blob_id": "195fec4dfeeef75f82e789159bf4c488f2ece126",
"branch_name": "refs/heads/master",
"committer_date": 1551318940000,
"content_id": "a116b497b295125d2070b7dfc2b141bf93d260fc",
"detected_licenses": [
"MIT"
],
"directory_id": "e4b019d2fd32e8e317dbbf4e440de1ff1686939c",
"extension": "py",
"fi... | 3.515625 | stackv2 | import glob
import os
from jinja2 import Template
def discover_pages():
print('compiling pages list...')
pages = []
all_content_docs = glob.glob("content/*.html") # returns list of filepaths
for doc in all_content_docs:
# create dictionary with input filepath, output filepath, and title
... | 86 | 27.92 | 98 | 17 | 563 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_052898f0b02f6670_4e4194f2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
16
] | [
39
] | |
2024-11-18T22:27:40.398158+00:00 | 1,532,204,334,000 | 3278845cdfee5aecc481f23ccb31671344d9dcd9 | 3 | {
"blob_id": "3278845cdfee5aecc481f23ccb31671344d9dcd9",
"branch_name": "refs/heads/master",
"committer_date": 1532204334000,
"content_id": "9cd67825b95f2c2e17ea9a13aeefbede105b5a37",
"detected_licenses": [
"MIT"
],
"directory_id": "3626796ac3f5b5b21695fdd5abb1423574d9ae35",
"extension": "py",
"fi... | 3.265625 | stackv2 | import getpass
import hashlib
import pyperclip
constant = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789' * 1000
print('Please input the name of the place where the password is used (should be unique).')
name = input()
while True:
password = getpass.getpass('Please input your master password.')
... | 27 | 28.78 | 90 | 10 | 192 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a9eecfc04deceee1_dd1211d9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
20
] | [
null
] | [
15
] | [
39
] | |
2024-11-18T22:27:53.659810+00:00 | 1,665,246,170,000 | 701aea92751416bbebcf5021131a7d2401c109ff | 3 | {
"blob_id": "701aea92751416bbebcf5021131a7d2401c109ff",
"branch_name": "refs/heads/master",
"committer_date": 1665246170000,
"content_id": "e018670f6db56d25ca87919888e129c2ae63bb47",
"detected_licenses": [
"MIT"
],
"directory_id": "a7cf147e30637744342e3c88f87c4491a67e16d8",
"extension": "py",
"fi... | 3.1875 | stackv2 | # -*- coding: utf-8 -*-
import os
import time
import tarfile
from fman import (
DirectoryPaneCommand,
show_status_message,
show_prompt,
)
__author__ = "Usman Mahmood"
__license__ = "MIT"
__version__ = "1.0.1"
__maintainer__ = "Usman Mahmood"
class Tarball(DirectoryPaneCommand):
def __call_... | 138 | 33.15 | 87 | 18 | 1,040 | python | [{"finding_id": "codeql_py/tarslip_f2425f43198e580c_958e4c34", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
71
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T22:28:14.645830+00:00 | 1,652,934,180,000 | 8d1fd3d5b18e3223a60547b77a2860e3ec441f37 | 3 | {
"blob_id": "8d1fd3d5b18e3223a60547b77a2860e3ec441f37",
"branch_name": "refs/heads/master",
"committer_date": 1652934180000,
"content_id": "4ed540da687d6c51f6a7e8c7c4847262ddf57175",
"detected_licenses": [
"MIT"
],
"directory_id": "adb112e307f153abaa94dda7effdc423fc0ee307",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
telescope = "ASKAP"
latitude_deg = -26.697000722
diameter_m = 12.0
import os
import sys
from util_misc import ascii_dat_read
#-----------------------------------------------------------------------------#
def main():
# Read the pad lookup table
col, dummy = ascii_dat_read("ASKAP_pads.... | 58 | 31.22 | 79 | 15 | 505 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1ad3b914d0241442_2966abe5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
45
] | [
null
] | [
18
] | [
54
] | |
2024-11-18T22:44:03.376901+00:00 | 1,588,115,718,000 | 15eabca3745ba5f9feac5081234c38e07d30cbc6 | 3 | {
"blob_id": "15eabca3745ba5f9feac5081234c38e07d30cbc6",
"branch_name": "refs/heads/master",
"committer_date": 1588115718000,
"content_id": "7e7806eb4c1688c95e9a7f3b2f7c7f5c48925da1",
"detected_licenses": [
"MIT"
],
"directory_id": "5f31dcada0073ad855dcbdcd88e6fd95d43611d8",
"extension": "py",
"fi... | 2.90625 | stackv2 | import base64
from Cryptodome.Cipher import AES
from datetime import date
#Key 16 digit olmalıdır.
def getKeyGenerator():
key = str(date.today())+"12345"
while len(key) < 16:
key = key +"0"
return key
def getDecode(encode):
secret_key = getKeyGenerator().encode("utf-8")
cipher = AES.new(s... | 28 | 24 | 72 | 13 | 198 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_cb412d3b6720b5a3_0ce3781d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
16,
25
] | [
null,
null
] | [
15,
32
] | [
55,
72
] | |
2024-11-18T22:44:05.313683+00:00 | 1,621,860,898,000 | df30c693a3857ec51757d42656764ea0834a4e85 | 2 | {
"blob_id": "df30c693a3857ec51757d42656764ea0834a4e85",
"branch_name": "refs/heads/master",
"committer_date": 1621860898000,
"content_id": "0585e30d2b513320f948c7d58e4f8090c0ec0132",
"detected_licenses": [
"MIT"
],
"directory_id": "451549ec3f5ea043b964541d72dd2609ea0a6278",
"extension": "py",
"fi... | 2.390625 | stackv2 | import argparse
import json
import subprocess
from jinja2 import Template
import toml
import black
# Template and target file locations of files that need to be generated
CODEGEN_FILES = [
("codegen/kanji_lists.jinja2", "kanji_lists/kanji_lists.py"),
("codegen/__init__.jinja2", "kanji_lists/__init__.py"),
... | 79 | 26.63 | 73 | 16 | 495 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9b386c93dbdadde9_11a43471", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
24
] | [
44
] | |
2024-11-18T21:00:31.190074+00:00 | 1,692,339,049,000 | 6d462595aacb82dda7dcb1f8beea268e9c385e4d | 3 | {
"blob_id": "6d462595aacb82dda7dcb1f8beea268e9c385e4d",
"branch_name": "refs/heads/master",
"committer_date": 1692339049000,
"content_id": "ecd8d0fa9f66de980d877ac13818311333768b37",
"detected_licenses": [
"MIT"
],
"directory_id": "0b60bd51d0dab21faed0b09ac4470fdcaa5400a3",
"extension": "py",
"fi... | 2.625 | stackv2 | from resources import utils, config as cfg
import itertools
from os.path import join, basename
from glob import glob
import argparse
from jinja2 import Environment, FileSystemLoader
import json
import numpy as np
from prettytable import PrettyTable
class Comparison(object):
"""
Contains all the data required... | 186 | 34.28 | 121 | 17 | 1,352 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fa111fe36051863c_40a81144", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
137
] | [
138
] | [
11
] | [
117
] | |
2024-11-18T21:00:36.576389+00:00 | 1,563,517,080,000 | d6ae93ec60ab9c07691bc57fb963a59c84540e6a | 2 | {
"blob_id": "d6ae93ec60ab9c07691bc57fb963a59c84540e6a",
"branch_name": "refs/heads/master",
"committer_date": 1563517080000,
"content_id": "3efa4fa9e3004a045d5107f0bcc7892a80587d65",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e014e5324ac8c05f14fc96227295dbf2007054e5",
"extension": "py"... | 2.4375 | stackv2 | import paramiko,time
def get_remote0(Host,Port=22,User='admin',Password='admin1'):
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect(Host, Port, User, Password)
chan = ssh.invoke_shell()
chan.send('config\n')
file_tosave = str(time.strftime('%Y-%m-%d_%H_%M_%S',time... | 27 | 30.52 | 87 | 14 | 267 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1e01aef006682778_6b0ed577", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
5
] | [
null
] | [
2
] | [
59
] | |
2024-11-18T21:00:57.956597+00:00 | 1,594,825,602,000 | bc2997c27ed55ab9ba8fa9f2c4a40893a71dce6b | 3 | {
"blob_id": "bc2997c27ed55ab9ba8fa9f2c4a40893a71dce6b",
"branch_name": "refs/heads/master",
"committer_date": 1594825602000,
"content_id": "21a7d4e6021a97c9bc1daefa90f9f33f6ae0f3d8",
"detected_licenses": [
"MIT"
],
"directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2",
"extension": "py",
"fi... | 2.546875 | stackv2 | import requests
import json
from Get_Room import get_room
from tools.api_key_webex import key
room_id = get_room('WebEx Automation')
print(room_id)
url = "https://webexapis.com/v1/messages?roomId="+room_id
request = requests.session()
request.headers = {
'Authorization': f'Bearer {key}',
'Content-Type': 'a... | 31 | 18.71 | 71 | 11 | 151 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f8c6e0dee7b04aa7_f12a9a8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
12
] | [
65
] | |
2024-11-18T21:01:01.400400+00:00 | 1,466,061,763,000 | 1530e344906291eb4fc7fde8eeacbf2e0e25a015 | 2 | {
"blob_id": "1530e344906291eb4fc7fde8eeacbf2e0e25a015",
"branch_name": "refs/heads/master",
"committer_date": 1466061763000,
"content_id": "67f1910347853d7b3dc0e2bf6a968b1f1daecd31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c00539ed72a86a8b9af8e9be3247ae1b1a85c997",
"extension": "py"... | 2.4375 | stackv2 | import json
import logging
import urllib
import urllib2
from flask import Flask, Response, request
from google.appengine.api import urlfetch, memcache
from google.appengine.ext import ndb
from dateutil import parser
import time
app = Flask(__name__)
#constant for connecting to telegram
TOKEN = "230588661:AAHxRwP4fH473... | 127 | 31.5 | 150 | 18 | 1,023 | python | [{"finding_id": "codeql_py/reflective-xss_a8cb0ac1d8653a12_a13e3c73", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scri... | [
84,
90,
94,
101,
104,
69
] | [
null,
null,
null,
null,
null,
null
] | [
33,
33,
33,
29,
29,
18
] | [
44,
44,
44,
40,
40,
29
] | |
2024-11-18T21:01:01.756970+00:00 | 1,665,673,250,000 | de62c51dc7027b8cb084b27e7fd240cdfa580402 | 2 | {
"blob_id": "de62c51dc7027b8cb084b27e7fd240cdfa580402",
"branch_name": "refs/heads/master",
"committer_date": 1665673250000,
"content_id": "8208e683f15cb763381f81cbab2bd3fb45fcbbf6",
"detected_licenses": [
"MIT"
],
"directory_id": "96bf72e5c296970ba9ec603d7413d26d1ea41789",
"extension": "py",
"fi... | 2.484375 | stackv2 | import glob
import json
config_field = None
def config():
global config_field
if(config_field is None):
config_field = json.load(open('config.json'))
return config_field
def splitPerClass(data):
neutral = [line for line in data if line[0] == 'neutral']
negativ = [line for line in data if l... | 135 | 28.16 | 109 | 14 | 1,116 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_21ccd6563b8548d6_5a1eff48", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.filmstarts.de](1) may be at an arbitrary po... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://www.filmstarts.de](1) may be at an arbitrary position in the sanitized URL."
] | [
89
] | [
null
] | [
36
] | [
82
] | |
2024-11-18T21:25:27.160479+00:00 | 1,637,578,739,000 | 3bf24a8a15989c79a99cbb942d9316979c1813d0 | 3 | {
"blob_id": "3bf24a8a15989c79a99cbb942d9316979c1813d0",
"branch_name": "refs/heads/master",
"committer_date": 1637578739000,
"content_id": "362ebea78486192d8f4a68190eb0d975385e61c6",
"detected_licenses": [
"MIT"
],
"directory_id": "3a6fac45e202f88e664cb58a55c245b12b3aaaf9",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/local/bin/python3
from http.server import SimpleHTTPRequestHandler
from socketserver import ForkingTCPServer
from urllib.request import urlopen
from argparse import ArgumentParser
argParser = ArgumentParser()
argParser.add_argument(
"--proxy-host",
type = str,
default = "127.0.0.1",
help ... | 63 | 33.25 | 113 | 18 | 549 | python | [{"finding_id": "codeql_py/partial-ssrf_da53a75a0dc7bf41_6c126cb3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
27
] | [
44
] | |
2024-11-18T22:01:02.601281+00:00 | 1,560,040,131,000 | 9645055cb8dbc80759f78e5b2514cf3d77789021 | 3 | {
"blob_id": "9645055cb8dbc80759f78e5b2514cf3d77789021",
"branch_name": "refs/heads/master",
"committer_date": 1560040131000,
"content_id": "0f11869af20ec240747e0595e2b3f3dc822b811d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "694a6ecdb2581dbf7b180a6d91b858c53d94f234",
"extension": "py"... | 3.140625 | stackv2 | import itertools as it
import string
from utils import timefunc
import paramiko
def create_client():
client_policy = paramiko.AutoAddPolicy()
client = paramiko.SSHClient()
client.set_missing_host_key_policy(client_policy)
return client
class Brutus:
def __init__(self, charset, length, ip):
... | 49 | 24.49 | 91 | 15 | 287 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cb517fbdcc04bfe5_53851a9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-312"
] | [
"py/paramiko-missing-host-key-validation",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
10,
45
] | [
null,
null
] | [
5,
15
] | [
54,
43
] | |
2024-11-18T22:01:14.090477+00:00 | 1,511,016,732,000 | e4102d2b46694532614f743ac8b3c1f9a8e16bfe | 2 | {
"blob_id": "e4102d2b46694532614f743ac8b3c1f9a8e16bfe",
"branch_name": "refs/heads/master",
"committer_date": 1511016732000,
"content_id": "769257641e35ee9e39851c3a9648c7a9efd74e8f",
"detected_licenses": [
"MIT"
],
"directory_id": "edb7527976e2fdc8e38843a19096f707055e0e05",
"extension": "py",
"fi... | 2.328125 | stackv2 | import requests
import os
import platform
import yaml
import urllib3
import tqdm
import hashlib
import xml.etree.ElementTree as ET
from .sfo import SfoFile
BUFFER_SIZE = 1024 * 1024 * 3
DEFAULT_RPCS3_SUBDIRS = ["shaderlog",
"GuiConfigs",
"dev_usb000",
... | 201 | 31.21 | 118 | 22 | 1,432 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cc2052c7b7dab2d5_683d3223", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
106,
124
] | [
107,
126
] | [
9,
17
] | [
39,
42
] | |
2024-11-18T22:15:03.576875+00:00 | 1,388,926,163,000 | e82d2f8ef7c9a84193ba9e9f73ca6de736decf21 | 3 | {
"blob_id": "e82d2f8ef7c9a84193ba9e9f73ca6de736decf21",
"branch_name": "refs/heads/master",
"committer_date": 1388926163000,
"content_id": "f41ec534dd030f5f3ddf0e6617a4a0dbe915db1a",
"detected_licenses": [
"MIT"
],
"directory_id": "4e0f36ca8a7c7dcceca10f0a3fec01703b22481a",
"extension": "py",
"fi... | 2.5625 | stackv2 | # Copyright (c) 2010 Hans Christian v. Stockhausen
# This file is part of mailreactor.
# See LICENSE for details.
import time
import hashlib
import base64
SECRET = '97303e71573c34af06eb0b7dbffc42e2'
class SRSError(Exception):
pass
class SRS(object):
def __init__(self, address, hostname):
if add... | 130 | 34.89 | 83 | 18 | 1,318 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f2e7abb286245031_7e8a93d8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
100
] | [
null
] | [
28
] | [
46
] | |
2024-11-18T20:39:52.852323+00:00 | 1,598,969,508,000 | 8323e29e6e9759e422f94c2e69d7e570aff9397d | 2 | {
"blob_id": "8323e29e6e9759e422f94c2e69d7e570aff9397d",
"branch_name": "refs/heads/master",
"committer_date": 1598969508000,
"content_id": "da00d9782d4415ad157a8929affb480d7c962d80",
"detected_licenses": [
"MIT"
],
"directory_id": "00f764663f3f195e1c6e2ecf306add77e0b014c9",
"extension": "py",
"fi... | 2.328125 | stackv2 | import re
import json
import socket
import paramiko
import basesocket
class Ssh(basesocket.BaseSocket):
TYPE_PASSWORD = 1
TYPE_PUBLIC_KEY = 2
def __init__(self, sock, proxy, config):
super(Ssh, self).__init__(sock)
self.termId = config['termId']
self.host = config['host']
... | 96 | 26.79 | 84 | 14 | 602 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c02fb5cdfd26c667_8c0d0da3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
13
] | [
75
] | |
2024-11-18T21:08:06.517036+00:00 | 1,631,969,409,000 | f1e0b7caafb0e93735eeb2b8fda8ba152076607d | 4 | {
"blob_id": "f1e0b7caafb0e93735eeb2b8fda8ba152076607d",
"branch_name": "refs/heads/master",
"committer_date": 1631969409000,
"content_id": "235edf0a631f5e0227a12715f2eccb74d6f52dc2",
"detected_licenses": [
"MIT"
],
"directory_id": "8731717a5966e1589832d4079f1a892f56ffdc38",
"extension": "py",
"fi... | 4.15625 | stackv2 | import secrets, string
def password_generator():
"""
A program that generates a secure random password
: return: None
"""
try:
# get the length of alphabets to be present in password
length_of_alphabets = int(input('\nEnter the length of alphabets (upper and lower case inclusive): '... | 30 | 49.8 | 114 | 15 | 311 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d81d2a925e16081f_6a2b42d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
28
] | [
null
] | [
15
] | [
100
] | |
2024-11-18T21:33:10.726196+00:00 | 1,598,908,563,000 | 0e7e72e2edb9b6e2137b88ab6bc7e860a23ee1cb | 3 | {
"blob_id": "0e7e72e2edb9b6e2137b88ab6bc7e860a23ee1cb",
"branch_name": "refs/heads/master",
"committer_date": 1598908563000,
"content_id": "e62074d9cc64c31e77c1ccb1e450b38f72a63a2b",
"detected_licenses": [
"MIT"
],
"directory_id": "01b1842a7b0f57a66184a388c629c9409b400dad",
"extension": "py",
"fi... | 2.515625 | stackv2 | import ast
from collections import defaultdict
import os
import traceback
import sys
import time
import jinja2
import yaml
class Definitions:
"""
Holds the definitions for the attacker actions on which the generator executes
"""
def __init__(self, config, env):
self.definitions_path = config... | 181 | 42.03 | 130 | 24 | 1,537 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f6cc89be6939225c_85af4ac6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
176
] | [
null
] | [
25
] | [
83
] | |
2024-11-18T21:49:03.224953+00:00 | 1,551,852,043,000 | 3da8d29afd9a0e4cbac763fa05a08c501ab2b407 | 3 | {
"blob_id": "3da8d29afd9a0e4cbac763fa05a08c501ab2b407",
"branch_name": "refs/heads/master",
"committer_date": 1551852043000,
"content_id": "92ea7655529b88eb5f67b98748be960ec9dfaa6a",
"detected_licenses": [
"MIT"
],
"directory_id": "dfecb18988858b6bc54131c3fa087dbb641b333b",
"extension": "py",
"fi... | 2.546875 | stackv2 | import logging
import os
import csv
from rest_framework.views import APIView
from rest_framework.response import Response
from rest_framework import status
import numpy as np
import sys,os
import json
import csv
import hashlib
import datetime
from random import *
from iFEED_API.venn_diagram.intersection import opti... | 211 | 32.82 | 115 | 24 | 1,295 | python | [{"finding_id": "codeql_py/path-injection_fc5004761a636f9c_63eebafb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
61
] | [
null
] | [
23
] | [
32
] | |
2024-11-18T22:26:08.282503+00:00 | 1,631,126,026,000 | b70cd07f4a8189a522db31f2eee2d50cf5529bd9 | 2 | {
"blob_id": "b70cd07f4a8189a522db31f2eee2d50cf5529bd9",
"branch_name": "refs/heads/master",
"committer_date": 1631126026000,
"content_id": "c5cd56118d9d3059fe6616e2418fd8c79e43cc76",
"detected_licenses": [
"MIT",
"CC0-1.0"
],
"directory_id": "251f5c092d4b7760cec8c2b6324e5290b917721f",
"extensio... | 2.375 | stackv2 | import json
import re
import scrapy
from locations.hours import OpeningHours
from locations.items import GeojsonPointItem
class AdvanceautopartsSpider(scrapy.Spider):
name = "advanceautoparts"
item_attributes = {"brand": "Advance Auto Parts", "brand_wikidata": "Q4686051"}
allowed_domains = ["stores.adv... | 68 | 42.01 | 119 | 17 | 628 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_9f2a4efa8c7bc38c_c972d1bd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'advanceautoparts.com/', so it might... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'advanceautoparts.com/', so it might match more hosts than expected."
] | [
20
] | [
null
] | [
32
] | [
87
] | |
2024-11-18T22:42:13.172776+00:00 | 1,653,444,826,000 | 903440b99fc9e9cddc325fcae934a31624b45ec2 | 2 | {
"blob_id": "903440b99fc9e9cddc325fcae934a31624b45ec2",
"branch_name": "refs/heads/master",
"committer_date": 1655689101000,
"content_id": "4a81351e9e92fdceaaea7fc1eaea1f37f9ed38f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5860c281b7d0b79e4af58edd589971f5317ea68f",
"extension": "py"... | 2.421875 | stackv2 | # Foremast - Pipeline Tooling
#
# Copyright 2018 Gogo, LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required... | 99 | 30.01 | 117 | 14 | 674 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_465df91d210e3b32_ee94621c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
47
] | [
null
] | [
16
] | [
88
] | |
2024-11-18T20:31:40.017736+00:00 | 1,503,565,595,000 | ac8bfcb56685cb9f27395f657f224d39c74dc8da | 3 | {
"blob_id": "ac8bfcb56685cb9f27395f657f224d39c74dc8da",
"branch_name": "refs/heads/master",
"committer_date": 1503565595000,
"content_id": "41a264a0295ae272755b22458d3fb5776e8efb82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "992018911e21a812dc6f09d94f38d2d46c390126",
"extension": "py"... | 2.96875 | stackv2 | #!flask/bin/python
#-*- coding: utf-8 -*-
from app import app
from flask import render_template, request
import json
from hashlib import md5
import re
from datetime import datetime
# TODO El 'Añ' no funciona, creo que por la Ñ
date_regex = ur'Añadid[oa] el ([^\s,]+),? ([1-9]|[1-3][0-9]?) de ([^\s]+) de ([0-9]+) (?:([0... | 113 | 33.36 | 173 | 18 | 1,022 | python | [{"finding_id": "codeql_py/polynomial-redos_7a57dff72b3e4c04_f3f54322", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/polynomial-redos",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '0'.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '0'."
] | [
34,
39
] | [
null,
null
] | [
47,
59
] | [
55,
71
] | |
2024-11-18T20:31:40.926264+00:00 | 1,549,981,340,000 | b0d171522db0194606999e04b22fd9158bce2c96 | 4 | {
"blob_id": "b0d171522db0194606999e04b22fd9158bce2c96",
"branch_name": "refs/heads/master",
"committer_date": 1549981340000,
"content_id": "5bc7d894a6d0da0be7f5620752e11d95a2b86020",
"detected_licenses": [
"MIT"
],
"directory_id": "924adc5bdf066b8feefda46877d24eeefb7849a4",
"extension": "py",
"fi... | 3.5625 | stackv2 | #!/usr/bin/env python3.6
def create_user(first_name,last_name,contact,user_name,email,password):
'''
Function to create a new user
'''
new_user = User(first_name,last_name,contact,user_name,email,password)
return new_user
def save_users(user):
'''
Function to save user
'''
user.sav... | 140 | 32.46 | 155 | 19 | 753 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af3c70ec89cd4334_6283b3b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
96
] | [
null
] | [
51
] | [
109
] | |
2024-11-18T20:31:53.050413+00:00 | 1,396,114,808,000 | 61418a8155d5d017e254bd736958bd2513c82c19 | 3 | {
"blob_id": "61418a8155d5d017e254bd736958bd2513c82c19",
"branch_name": "refs/heads/master",
"committer_date": 1396114808000,
"content_id": "af1a9d2fae3c0e6b8e37c2cd8595299cd2f8aa18",
"detected_licenses": [
"MIT"
],
"directory_id": "436c36600e4199db441ded4532bc0c08cf043710",
"extension": "py",
"fi... | 2.96875 | stackv2 | # coding=utf-8
"""
A script that is able to parse the ICS Cards ABN Amro site
and download statements for a specific month and save them
as CSV.
It does some simple parsing of the statement entries to
make the CSV data more useful for importing into a
financial planning application.
For options/help:::
> python ... | 304 | 30.86 | 120 | 17 | 2,194 | python | [{"finding_id": "codeql_py/request-without-cert-validation_eabf95c3580e36b1_c1508b29", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
176
] | [
null
] | [
17
] | [
76
] | |
2024-11-18T20:53:32.481965+00:00 | 1,616,960,542,000 | 8f541c53b39934fb36bf6e70284ea0fb613f9d0f | 4 | {
"blob_id": "8f541c53b39934fb36bf6e70284ea0fb613f9d0f",
"branch_name": "refs/heads/master",
"committer_date": 1616960542000,
"content_id": "cb3d6e4db58133f9a78f2d8575a0e3cd280dbefc",
"detected_licenses": [
"MIT"
],
"directory_id": "e16a407418b882443d4c0dc77f213c6ac191d995",
"extension": "py",
"fi... | 3.71875 | stackv2 | """
pirple/python/project2/main.py
Project #2
Create a hangman game
"""
from os import system, name
from time import sleep
from random import randint
import string
def clear_screen():
# for windows
if name == 'nt':
_ = system('cls')
# for mac and linux(here, os.name is 'posix')
else:
... | 281 | 28.29 | 134 | 21 | 2,044 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4515a5fa1eff163_9ee02dad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
128,
134,
226
] | [
null,
null,
null
] | [
15,
19,
15
] | [
16,
20,
26
] | |
2024-11-18T20:53:36.477172+00:00 | 1,347,003,487,000 | 21f10caceecd36f693963f3701fcf9620e994954 | 2 | {
"blob_id": "21f10caceecd36f693963f3701fcf9620e994954",
"branch_name": "refs/heads/master",
"committer_date": 1347003487000,
"content_id": "9acaab9547a31fc2a5ac9df37725b6b1f8d23910",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8f2ebfd074f80be51f6bbbc84334c609871f578c",
"extension": "p... | 2.3125 | stackv2 | import re
import urllib
############### Functions called by stackdoc
def get_version():
return 1
def get_ids(title, body, tags):
ids = []
if "http://api.jquery.com/" in body:
matches = re.findall(r"http://api\.jquery\.com/([.\-a-zA-Z0-9]+)/?", body)
for match_id in matches:
... | 22 | 18.59 | 83 | 11 | 110 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4d43b11e75d38e47_afa7dea1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://api.jquery.com/](1) may be at an arbitrary posi... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [http://api.jquery.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
12
] | [
null
] | [
8
] | [
40
] | |
2024-11-18T21:10:49.363592+00:00 | 1,589,718,217,000 | c64190e136015c0f944137ee809f5f18e4f0a60d | 3 | {
"blob_id": "c64190e136015c0f944137ee809f5f18e4f0a60d",
"branch_name": "refs/heads/master",
"committer_date": 1589718217000,
"content_id": "d643476562c1e0257c19e8abf1b1c5a58c532669",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9af6f5acd478b565f91256f2115ba464ace6005c",
"extension": "py"... | 2.84375 | stackv2 | import paramiko
import os, time
class SSHClient():
sleep_time = 20
def __init__(self, ip_address, private_key, user="ec2-user"):
self.ip_address = ip_address
self.private_key = private_key
self.user = user
# Init SSH Client
self.RSAkey = paramiko.RSAKey.from_private_... | 69 | 32.28 | 110 | 18 | 501 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2bf34be8d0947ca2_943a8cd3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
17
] | [
null
] | [
9
] | [
74
] | |
2024-11-18T21:46:31.587098+00:00 | 1,491,100,609,000 | c8c4a6fa6537e3ffcbddd054b962eb30b058d2da | 2 | {
"blob_id": "c8c4a6fa6537e3ffcbddd054b962eb30b058d2da",
"branch_name": "refs/heads/master",
"committer_date": 1491100609000,
"content_id": "845339f05dc77e8c827dcfc97e3c73d00e02fd32",
"detected_licenses": [
"MIT"
],
"directory_id": "945a02e1cd92ede1b0ca60011ab6d84c5a17a1f6",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
import sys
import time
from struct import unpack
from Crypto.Cipher import AES
MOD2HEX = dict(
(ord(c1),ord(c2)) for (c1,c2) in
zip('cbdefghijklnrtuv', '0123456789abcdef') )
def modhex(s):
s = s.translate(MOD2HEX)
return bytes.fromhex(s)
def getcrc(data):
v = 0xffff
for b... | 46 | 22.37 | 64 | 12 | 417 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_8c68a817a17760e9_59395389", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
37
] | [
null
] | [
12
] | [
27
] | |
2024-11-18T21:47:33.276765+00:00 | 1,548,166,921,000 | ff65eeecaa0754e2023f219ff9c64f5ca61a4161 | 2 | {
"blob_id": "ff65eeecaa0754e2023f219ff9c64f5ca61a4161",
"branch_name": "refs/heads/master",
"committer_date": 1548166921000,
"content_id": "c980cc7b5540356f4380ece1056b28ab8b45ef8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b2e8c8a68f69a5ae7a2c2395d28ec9ef91db4e36",
"extension": "py"... | 2.390625 | stackv2 | #!/usr/bin/env python2
#
# config_sensor.py
#
# Part of the HoneySens SensorOS distribution.
# Reconfigures the sensor if given a configuration archive.
#
# by Pascal Brueckner
import sys
import os
import tempfile
import ConfigParser
import tarfile
import fileinput
import shutil
if len(sys.argv) != 2 or not os.path.... | 72 | 29.06 | 69 | 13 | 559 | python | [{"finding_id": "codeql_py/tarslip_90717ba53c23a430_eab512e6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
28
] | [
null
] | [
null
] | [
4
] | |
2024-11-18T21:47:37.323136+00:00 | 1,599,147,728,000 | 96ca50bceeef0ea7fae8d21840af88b731f82b90 | 3 | {
"blob_id": "96ca50bceeef0ea7fae8d21840af88b731f82b90",
"branch_name": "refs/heads/master",
"committer_date": 1599147728000,
"content_id": "d269a5ea77d552a4ed88f08342a2e605b0a50aa8",
"detected_licenses": [
"MIT"
],
"directory_id": "15c68e1df6f9e91636b867cd7ec6a21191e6bd74",
"extension": "py",
"fi... | 2.8125 | stackv2 | """Uses JSON-formated file storage for sessions
NOTE: does not time-out the sessions!
Based on http://flask.pocoo.org/snippets/132/
"""
import os, json
from uuid import uuid1
from collections import MutableMapping
from flask.sessions import SessionInterface, SessionMixin
class JSONSession(MutableMapping, SessionM... | 97 | 28.16 | 76 | 15 | 623 | python | [{"finding_id": "codeql_py/path-injection_cbd6ff7497381fa1_ff7f10b7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
23
] | [
32
] | |
2024-11-18T22:28:50.787599+00:00 | 1,514,466,786,000 | 89ef3375ef0f52d9701b02df7163f5386ac20ff7 | 2 | {
"blob_id": "89ef3375ef0f52d9701b02df7163f5386ac20ff7",
"branch_name": "refs/heads/master",
"committer_date": 1514466786000,
"content_id": "0c7cc624ad22e58cbfcb10fcc2f3719a09507ba2",
"detected_licenses": [
"MIT"
],
"directory_id": "f1d9691476f932bbbbd2102b45ab23d6330bbc17",
"extension": "py",
"fi... | 2.34375 | stackv2 | import configparser
class Config():
def __init__(self):
self.api_url = 'http://umorili.herokuapp.com'
self.token = ''
self.config = None
self.cert = None
self.port = 8443
self.host = None
def load(self):
self.config = configparser.ConfigParser()
... | 59 | 25.37 | 67 | 11 | 345 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_177d6c1b1bb1ab52_1943f864", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
26
] | [
null
] | [
29
] | [
39
] | |
2024-11-18T22:29:02.459662+00:00 | 1,693,266,904,000 | bb5fc1fbfdeeaad519e5d87d3894dcfdaa74f12b | 3 | {
"blob_id": "bb5fc1fbfdeeaad519e5d87d3894dcfdaa74f12b",
"branch_name": "refs/heads/main",
"committer_date": 1693266904000,
"content_id": "2c297f7cd5409d6d8a47671d934741c638af2398",
"detected_licenses": [
"AFL-3.0"
],
"directory_id": "ffb0b623455f22af81a03eb52889bd1bfed50566",
"extension": "py",
"... | 2.5625 | stackv2 | import contextlib
import hashlib
import logging
import os
import os.path
import platform
import re
import shutil
import sys
import tempfile
from collections.abc import Generator
from datetime import datetime
from enum import Enum
from pathlib import Path
from typing import IO, Any
from urllib.parse import urlparse
imp... | 225 | 28.65 | 84 | 14 | 1,625 | python | [{"finding_id": "codeql_py/overly-permissive-file_84742792dfc11fd6_eda7cfed", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
119
] | [
null
] | [
5
] | [
37
] | |
2024-11-18T22:29:37.306725+00:00 | 1,424,362,789,000 | 47bf7bb1de90a4fff15c24c40c3c8d4bf4d50588 | 2 | {
"blob_id": "47bf7bb1de90a4fff15c24c40c3c8d4bf4d50588",
"branch_name": "refs/heads/master",
"committer_date": 1424362789000,
"content_id": "6fc143c8e0ab830faa27eba4d4e11466b8dea15f",
"detected_licenses": [
"MIT"
],
"directory_id": "e3ba4f661395b1d73b5fc8072f964b32a9242b60",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding=utf-8
from __future__ import absolute_import, unicode_literals, division
from puls.models import memoized
from puls import app
import mongoengine as mge
import datetime
import wtforms as wtf
import flask_wtf
import hashlib
class Admin(app.db.Document):
# authentication information
email = mge.EmailF... | 53 | 35.19 | 77 | 15 | 369 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_98cb279c2ad6297f_9e33d1dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
50
] | [
null
] | [
35
] | [
43
] | |
2024-11-18T22:29:42.629406+00:00 | 1,691,912,998,000 | 24df49ed2990436b0e7bb8ed082334f1ca65abd6 | 2 | {
"blob_id": "24df49ed2990436b0e7bb8ed082334f1ca65abd6",
"branch_name": "refs/heads/main",
"committer_date": 1691912998000,
"content_id": "ecb44bbe3abf47663c9634437f5ccca71460df74",
"detected_licenses": [
"MIT"
],
"directory_id": "c14853662f6d89fc36c1735f0df1989def9d7813",
"extension": "py",
"file... | 2.390625 | stackv2 | import re
from aqt.utils import tooltip, getText, showWarning, askUser, showText
from collections import OrderedDict
from typing import List, Dict
from anki.stats_pb2 import CardStatsResponse
from anki.cards import Card
from anki.stats import (
REVLOG_LRN,
REVLOG_REV,
REVLOG_RELRN,
REVLOG_CRAM,
RE... | 310 | 35.16 | 138 | 18 | 2,850 | python | [{"finding_id": "codeql_py/redos_dcee8a1e7c3b3ae5_45db55da", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'deck_name==' and containing many ... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'deck_name==' and containing many repetitions of ' =='."
] | [
90
] | [
null
] | [
39
] | [
41
] | |
2024-11-18T22:40:26.976426+00:00 | 1,604,653,091,000 | 223ab2a9fb973d8c695d953818adf9ed1e0db214 | 3 | {
"blob_id": "223ab2a9fb973d8c695d953818adf9ed1e0db214",
"branch_name": "refs/heads/master",
"committer_date": 1604653091000,
"content_id": "a9e32305cf9398cc840a1fb6543336618ff08083",
"detected_licenses": [
"MIT"
],
"directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Sample script to get the Time configurations via iRMC Redfish API
in Fujitsu PRIMERGY
[Usage]
$ python ./get_time_configuration -i 192.168.10.10 -u admin -p admin
"""
import sys
import argparse
import requests
import urllib3
urllib3.disable_warnings(urllib3.ex... | 83 | 29.05 | 113 | 16 | 642 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c6458c445f22d69a_c4036503", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
24,
35,
44
] | [
null,
40,
49
] | [
16,
20,
24
] | [
70,
10,
14
] | |
2024-11-18T22:40:31.627046+00:00 | 1,566,569,831,000 | bab248611973d3b789e39e36168b56386764d5a7 | 3 | {
"blob_id": "bab248611973d3b789e39e36168b56386764d5a7",
"branch_name": "refs/heads/master",
"committer_date": 1566569831000,
"content_id": "8b4e42e5f4cdc4098af094f7c98dd56ec86a02e5",
"detected_licenses": [
"MIT"
],
"directory_id": "b850fcc016651c93db5951e787d4f5b2f7e077d7",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding=utf-8
import os
import requests
import socket
from framework.util.Log import Log
TAG = os.path.basename(__file__)
class HttpRequest:
def __init__(self, host, port=-1, timeout=60, headers={
'User-Agent':'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 ... | 63 | 34.29 | 131 | 16 | 540 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5a745e25b41a644e_5bfc2587", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
27,
45
] | [
null,
46
] | [
24,
24
] | [
121,
81
] | |
2024-11-18T22:40:34.451068+00:00 | 1,620,697,532,000 | 5a18d5c6c61c39d21d3609903aaf793680302ab3 | 2 | {
"blob_id": "5a18d5c6c61c39d21d3609903aaf793680302ab3",
"branch_name": "refs/heads/main",
"committer_date": 1620697532000,
"content_id": "7e76f7bc9ca91a1ae518094836c37c6fc02b7cac",
"detected_licenses": [
"MIT"
],
"directory_id": "4d79e052b8b275371d1275642c417d7edae72985",
"extension": "py",
"file... | 2.328125 | stackv2 | from flask import Flask, render_template, request, redirect, url_for, session
from flaskext.mysql import MySQL
import pymysql
import re
import sendgrid
import os
from sendgrid.helpers.mail import Mail, Email, To, Content
app = Flask(__name__)
mysql = MySQL()
app.secret_key = '1a2b3c4d5e'
app.config['MYSQL_DATABASE_... | 123 | 38.8 | 124 | 17 | 1,112 | python | [{"finding_id": "codeql_py/flask-debug_1ede4dfbc7714294_eab354fa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-1333"
] | [
"py/flask-debug",
"py/polynomial-redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'."
] | [
123,
74
] | [
null,
null
] | [
5,
50
] | [
40,
55
] | |
2024-11-18T22:41:05.036876+00:00 | 1,620,593,293,000 | 92bf3853c240fa79f0fc9264f17b882945cbfddb | 3 | {
"blob_id": "92bf3853c240fa79f0fc9264f17b882945cbfddb",
"branch_name": "refs/heads/main",
"committer_date": 1621951863000,
"content_id": "4e9ab054af880f59ae98b4f74ee3ecaf34db62de",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c1aa5704883d924cf381a88c7164ba7d4da22780",
"extension": "py"... | 2.890625 | stackv2 | #%%
import requests
res = requests.get('https://scotch.io')
print(res)
# %%
py_list = ['Bob', 'Anne', 'Joe']
py_tuple = ('Bob', 'Anne', 'Joe')
py_set = {'Bob', 'Anne', 'Joe'}
# %%
print(py_list[0])
print(py_tuple[0])
print(py_set)
# %%
py_list.append('John')
print(py_list)
# %%
py_list_ext = ['Mike', 'Samuel']
py_l... | 111 | 17.21 | 82 | 14 | 599 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a2457eb50306c4b_f0281e88", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
70
] | [
null
] | [
11
] | [
24
] | |
2024-11-18T22:41:16.735752+00:00 | 1,614,024,154,000 | 7f29a0ab59add1402ea943dbb6c9a8dec0b43e58 | 3 | {
"blob_id": "7f29a0ab59add1402ea943dbb6c9a8dec0b43e58",
"branch_name": "refs/heads/master",
"committer_date": 1614024154000,
"content_id": "48504feedf9b8d8c148c47db0b9eabedd33f6ae9",
"detected_licenses": [
"MIT"
],
"directory_id": "203c647cf6ac13abe1a5a4363d4c9640bdf534c2",
"extension": "py",
"fi... | 2.71875 | stackv2 | """provides control endpoints and serves visual state of a simulation model"""
import logging
import os
from casymda.visualization.web_server.sim_controller import (
RunnableSimulation,
SimController,
)
from flask import Flask, request, send_file, send_from_directory
from flask_cors import CORS
logging.getLo... | 90 | 31.66 | 86 | 16 | 593 | python | [{"finding_id": "codeql_py/flask-debug_08d9f0cb7920cb40_6bcc05dc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
84,
46
] | [
null,
null
] | [
9,
34
] | [
71,
42
] | |
2024-11-18T22:54:18.123893+00:00 | 1,493,823,633,000 | 084e91ecc598d69215d79e42c305663ab801eeb6 | 3 | {
"blob_id": "084e91ecc598d69215d79e42c305663ab801eeb6",
"branch_name": "refs/heads/master",
"committer_date": 1493823633000,
"content_id": "840f10ef50d34ebfdbb76462ce0f7d027d512f6e",
"detected_licenses": [
"MIT"
],
"directory_id": "fb79629ece38f575d423e58f8dc92bf571819116",
"extension": "py",
"fi... | 2.578125 | stackv2 | from selenium import webdriver
from selenium.webdriver.common.keys import Keys
import time
import requests
class TeamcityWebGui(object):
def __init__(self, teamcityURL, username, password):
"""
Teamcity WEB GUI object
:param teamcityURL: e.g. https://teamcity.example.com
:param use... | 111 | 30.14 | 115 | 18 | 728 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d98180e797498ec_be6ab71b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
53,
93,
81
] | [
null,
null,
87
] | [
15,
15,
13
] | [
98,
35,
10
] | |
2024-11-18T22:54:29.241956+00:00 | 1,633,953,222,000 | b0fa48431286e65ff91b46d82a93513fdc829506 | 2 | {
"blob_id": "b0fa48431286e65ff91b46d82a93513fdc829506",
"branch_name": "refs/heads/main",
"committer_date": 1633953222000,
"content_id": "22c2c2d672e8129535952627718fbc8c6e7d8c15",
"detected_licenses": [
"MIT"
],
"directory_id": "128bf2eb236ef978533aa1d4eeb0863a5a65611e",
"extension": "py",
"file... | 2.375 | stackv2 | #!/usr/bin/python3
# -*- coding: utf-8 -*-
"""
.. module:: __init__
:synopsis: module that contains templating related classes.
"""
import copy
import logging
import threading
from os import environ
from jinja2 import Environment, StrictUndefined
from jinja2.exceptions import TemplateSyntaxError, UndefinedError
... | 238 | 29.42 | 102 | 19 | 1,517 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_eb8024e289ead576_3e42502b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
95
] | [
null
] | [
15
] | [
71
] | |
2024-11-18T22:54:31.132465+00:00 | 1,387,533,666,000 | 4acccc23db8337ca60680fc80c48d5d9fce7c286 | 2 | {
"blob_id": "4acccc23db8337ca60680fc80c48d5d9fce7c286",
"branch_name": "refs/heads/master",
"committer_date": 1387533666000,
"content_id": "5fe2124e94d02e3c18789896ba2a16b00f5ccfc4",
"detected_licenses": [
"MIT"
],
"directory_id": "1e4d78d0788a9ddea8c55e3a3dde484aa2ba04ea",
"extension": "py",
"fi... | 2.5 | stackv2 | # encoding:utf-8
import codecs
import json
import urllib
from urllib2 import Request, urlopen
import sys
__author__ = 'zhouqi'
verified_type_dict_str = u'''
-1 屌丝
0 名人
1 政府
2 企业
3 媒体
4 校园
5 网站
6 应用
7 团体(机构)
8 待审企业
200 初级达人
220 中高级达人
400 已故V用户
10 微女郎
'''
verified_type_dict = dict([e.split(' ') for e in verified_type_... | 89 | 25.38 | 112 | 15 | 732 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f77fc5cab679376_673aeabb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
78
] | [
null
] | [
17
] | [
22
] | |
2024-11-18T21:33:00.634531+00:00 | 1,692,920,755,000 | 3241813302674be5ea109362ae1771d37f5baa1a | 2 | {
"blob_id": "3241813302674be5ea109362ae1771d37f5baa1a",
"branch_name": "refs/heads/main",
"committer_date": 1692920755000,
"content_id": "ff4a8d52a11661fbeb7ab22f13da99237ee4b7d9",
"detected_licenses": [
"MIT"
],
"directory_id": "057587afaa374a33eb8a0de0344b13fa6cd44fb4",
"extension": "py",
"file... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4
"""Bintray Package info update
This Conan hook reads your recipe and updates its Bintray package info using the attributes.
It's necessary pass Bintray login by environment variables:
- BINTRAY_LOGIN_USERNAME: Bintr... | 290 | 35.72 | 98 | 19 | 2,440 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a8016c58a6e58a08_a360b1a8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
166
] | [
null
] | [
12
] | [
47
] | |
2024-11-18T21:33:01.288550+00:00 | 1,618,542,677,000 | da3b3f8c2cd70f441ae8c5460128d8696306a743 | 3 | {
"blob_id": "da3b3f8c2cd70f441ae8c5460128d8696306a743",
"branch_name": "refs/heads/master",
"committer_date": 1618542677000,
"content_id": "ff02fb01d162891eb1335e5fe13b4a673d14655a",
"detected_licenses": [
"MIT"
],
"directory_id": "04051972311325ba18526ba082fec24e010f546b",
"extension": "py",
"fi... | 2.640625 | stackv2 | import hmac
import logging
from rest_framework.viewsets import ViewSet
from rest_framework.parsers import JSONParser
from rest_framework.response import Response
from rest_framework.status import HTTP_200_OK, HTTP_500_INTERNAL_SERVER_ERROR, HTTP_403_FORBIDDEN, HTTP_400_BAD_REQUEST
from pss_project.api.github_integrat... | 94 | 43.5 | 119 | 18 | 852 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6970b9c71d5b7528_693c2cee", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This log entry depends on a [user-provided value](1)."
] | [
70,
50
] | [
null,
null
] | [
29,
26
] | [
94,
66
] | |
2024-11-18T21:33:15.438372+00:00 | 1,692,719,831,000 | 98e74092e798be96866237809d86bbfb54879d98 | 2 | {
"blob_id": "98e74092e798be96866237809d86bbfb54879d98",
"branch_name": "refs/heads/main",
"committer_date": 1692719831000,
"content_id": "cd68945babfb76826ef86ed84e41b5649ebde514",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "458d2e2131ab57bb95933b0d200b47828aef1fee",
"extension": "py",
... | 2.46875 | stackv2 | import logging
import re
import inspect
from flask import request, abort, redirect
from functools import wraps
from .language import DEFAULT_LANGUAGE, LANGUAGE_MAPPING
from .config import (
SUPPORTED_YEARS,
DEFAULT_YEAR,
SUPPORTED_CHAPTERS,
SUPPORTED_LANGUAGES,
)
TYPO_CHAPTERS = {
"http-2": "http... | 173 | 34.03 | 100 | 18 | 1,348 | python | [{"finding_id": "codeql_py/url-redirection_08c3bbceb75e5356_144a9079", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 6 | true | [
"CWE-601",
"CWE-601",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/url-redirection",
"py/url-redirection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](... | [
51,
61,
153,
160,
165,
169
] | [
null,
null,
null,
null,
null,
null
] | [
33,
33,
23,
31,
23,
31
] | [
49,
78,
68,
85,
81,
85
] | |
2024-11-18T21:33:23.490303+00:00 | 1,577,632,423,000 | a8153ed475610ffb2bb254f8268cf989738def27 | 3 | {
"blob_id": "a8153ed475610ffb2bb254f8268cf989738def27",
"branch_name": "refs/heads/master",
"committer_date": 1577632423000,
"content_id": "3f9cb03865f8d4fa0b5e5a8385c38fb60d7b0d4f",
"detected_licenses": [
"MIT"
],
"directory_id": "659a886cd521804c8fdc512f55a1172bc166bb9f",
"extension": "py",
"fi... | 3.34375 | stackv2 | # Secure Container
# It is a 6 digit number
# Value is within 284639 and 748759
# Two adjacent digits are the same
# From left to right digits never decrease
start = 284639
end = 748759
def digits_do_not_decrease(digits):
for i in range(len(digits)-1):
if digits[i+1] < digits[i]:
return False
... | 89 | 26.66 | 88 | 13 | 657 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a0537b426a21a06_634d6c33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
42
] | [
null
] | [
11
] | [
17
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.